diff --git a/static/graphs/00220228-a5a4-4032-a30d-826bb55aa3fb b/static/graphs/00220228-a5a4-4032-a30d-826bb55aa3fb new file mode 100644 index 0000000..85dc326 --- /dev/null +++ b/static/graphs/00220228-a5a4-4032-a30d-826bb55aa3fb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=FIN7" [label="threat-actor\nFIN7",shape=octagon,style=filled,color=indianred1];"threat-actor=FIN7" -> "mitre-enterprise-attack-intrusion-set=FIN7 - G0046" [label="similar",dir="both"];"threat-actor=FIN7" -> "mitre-enterprise-attack-intrusion-set=Carbanak - G0008" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=FIN7 - G0046" [label="mitre-enterprise-attack-intrusion-set\nFIN7 - G0046",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=FIN7 - G0046" -> "mitre-enterprise-attack-attack-pattern=Scheduled Task - T1053" [label="uses",];"mitre-enterprise-attack-intrusion-set=Carbanak - G0008" [label="mitre-enterprise-attack-intrusion-set\nCarbanak - G0008",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Carbanak - G0008" -> "mitre-enterprise-attack-attack-pattern=Remote Access Tools - T1219" [label="uses",];} diff --git a/static/graphs/00220228-a5a4-4032-a30d-826bb55aa3fb.png b/static/graphs/00220228-a5a4-4032-a30d-826bb55aa3fb.png new file mode 100644 index 0000000..74abf83 Binary files /dev/null and b/static/graphs/00220228-a5a4-4032-a30d-826bb55aa3fb.png differ diff --git a/static/graphs/007b44b6-e4c5-480b-b5b9-56f2081b1b7b b/static/graphs/007b44b6-e4c5-480b-b5b9-56f2081b1b7b new file mode 100644 index 0000000..4ff6f52 --- /dev/null +++ b/static/graphs/007b44b6-e4c5-480b-b5b9-56f2081b1b7b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=HDoor - S0061" [label="mitre-enterprise-attack-malware\nHDoor - S0061",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=HDoor - S0061" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];} diff --git a/static/graphs/007b44b6-e4c5-480b-b5b9-56f2081b1b7b.png b/static/graphs/007b44b6-e4c5-480b-b5b9-56f2081b1b7b.png new file mode 100644 index 0000000..c35e296 Binary files /dev/null and b/static/graphs/007b44b6-e4c5-480b-b5b9-56f2081b1b7b.png differ diff --git a/static/graphs/00c31914-bc0e-11e8-8241-3ff3b5e4671d b/static/graphs/00c31914-bc0e-11e8-8241-3ff3b5e4671d new file mode 100644 index 0000000..1f94311 --- /dev/null +++ b/static/graphs/00c31914-bc0e-11e8-8241-3ff3b5e4671d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=NotPetya" [label="tool\nNotPetya",shape=box,style=filled,color=deepskyblue];"tool=NotPetya" -> "ransomware=Bad Rabbit" [label="similar",dir="both"];"tool=NotPetya" -> "malpedia=EternalPetya" [label="similar",dir="both"];"ransomware=Bad Rabbit" [label="ransomware\nBad Rabbit",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/00c31914-bc0e-11e8-8241-3ff3b5e4671d.png b/static/graphs/00c31914-bc0e-11e8-8241-3ff3b5e4671d.png new file mode 100644 index 0000000..3799316 Binary files /dev/null and b/static/graphs/00c31914-bc0e-11e8-8241-3ff3b5e4671d.png differ diff --git a/static/graphs/00c3bfcb-99bd-4767-8c03-b08f585f5c8a b/static/graphs/00c3bfcb-99bd-4767-8c03-b08f585f5c8a new file mode 100644 index 0000000..85f2960 --- /dev/null +++ b/static/graphs/00c3bfcb-99bd-4767-8c03-b08f585f5c8a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=PowerDuke - S0139" [label="mitre-enterprise-attack-malware\nPowerDuke - S0139",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PowerDuke - S0139" -> "malpedia=PowerDuke" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PowerDuke - S0139" -> "mitre-enterprise-attack-attack-pattern=File Deletion - T1107" [label="uses",];} diff --git a/static/graphs/00c3bfcb-99bd-4767-8c03-b08f585f5c8a.png b/static/graphs/00c3bfcb-99bd-4767-8c03-b08f585f5c8a.png new file mode 100644 index 0000000..ac18eb8 Binary files /dev/null and b/static/graphs/00c3bfcb-99bd-4767-8c03-b08f585f5c8a.png differ diff --git a/static/graphs/00ca9891-c7dd-44db-a374-14b92169741a b/static/graphs/00ca9891-c7dd-44db-a374-14b92169741a new file mode 100644 index 0000000..71e3e63 --- /dev/null +++ b/static/graphs/00ca9891-c7dd-44db-a374-14b92169741a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-System" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/00ca9891-c7dd-44db-a374-14b92169741a.png b/static/graphs/00ca9891-c7dd-44db-a374-14b92169741a.png new file mode 100644 index 0000000..007d57a Binary files /dev/null and b/static/graphs/00ca9891-c7dd-44db-a374-14b92169741a.png differ diff --git a/static/graphs/00d7d21b-69d6-4797-88a2-c86f3fc97651 b/static/graphs/00d7d21b-69d6-4797-88a2-c86f3fc97651 new file mode 100644 index 0000000..cb15b58 --- /dev/null +++ b/static/graphs/00d7d21b-69d6-4797-88a2-c86f3fc97651 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Password Filter DLL Mitigation - T1174" [label="mitre-enterprise-attack-course-of-action\nPassword Filter DLL Mitigation - T1174",shape=ellipse];"mitre-enterprise-attack-course-of-action=Password Filter DLL Mitigation - T1174" -> "mitre-enterprise-attack-attack-pattern=Password Filter DLL - T1174" [label="mitigates",];} diff --git a/static/graphs/00d7d21b-69d6-4797-88a2-c86f3fc97651.png b/static/graphs/00d7d21b-69d6-4797-88a2-c86f3fc97651.png new file mode 100644 index 0000000..634244b Binary files /dev/null and b/static/graphs/00d7d21b-69d6-4797-88a2-c86f3fc97651.png differ diff --git a/static/graphs/00edb40d-2fed-4d36-98b1-c85fc2bb1168 b/static/graphs/00edb40d-2fed-4d36-98b1-c85fc2bb1168 new file mode 100644 index 0000000..51a830e --- /dev/null +++ b/static/graphs/00edb40d-2fed-4d36-98b1-c85fc2bb1168 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"microsoft-activity-group=PARINACOTA" [label="microsoft-activity-group\nPARINACOTA",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=PARINACOTA" -> "ransomware=Wadhrama" [label="uses",];"ransomware=Wadhrama" [label="ransomware\nWadhrama",shape=box,style=filled,color=deepskyblue];"ransomware=Wadhrama" -> "microsoft-activity-group=PARINACOTA" [label="used-by",];} diff --git a/static/graphs/00edb40d-2fed-4d36-98b1-c85fc2bb1168.png b/static/graphs/00edb40d-2fed-4d36-98b1-c85fc2bb1168.png new file mode 100644 index 0000000..baa2d92 Binary files /dev/null and b/static/graphs/00edb40d-2fed-4d36-98b1-c85fc2bb1168.png differ diff --git a/static/graphs/01a4f3c4-a578-49bd-b6ab-eb3b7d27d8c1 b/static/graphs/01a4f3c4-a578-49bd-b6ab-eb3b7d27d8c1 new file mode 100644 index 0000000..effc57d --- /dev/null +++ b/static/graphs/01a4f3c4-a578-49bd-b6ab-eb3b7d27d8c1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Covenant" [label="tool\nCovenant",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/01a4f3c4-a578-49bd-b6ab-eb3b7d27d8c1.png b/static/graphs/01a4f3c4-a578-49bd-b6ab-eb3b7d27d8c1.png new file mode 100644 index 0000000..48e047d Binary files /dev/null and b/static/graphs/01a4f3c4-a578-49bd-b6ab-eb3b7d27d8c1.png differ diff --git a/static/graphs/025ab0ce-bffc-11e8-be19-d70ec22c5d56 b/static/graphs/025ab0ce-bffc-11e8-be19-d70ec22c5d56 new file mode 100644 index 0000000..ff62719 --- /dev/null +++ b/static/graphs/025ab0ce-bffc-11e8-be19-d70ec22c5d56 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Sora" [label="botnet\nSora",shape=box,style=filled,color=deepskyblue];"botnet=Sora" -> "botnet=Mirai" [label="variant-of",];"botnet=Sora" -> "tool=Mirai" [label="variant-of",];"botnet=Sora" -> "botnet=Owari" [label="variant-of",];"botnet=Mirai" [label="botnet\nMirai",shape=box,style=filled,color=deepskyblue];"botnet=Mirai" -> "malpedia=Mirai (ELF)" [label="similar",dir="both"];"botnet=Mirai" -> "botnet=Owari" [label="variant-of",];"botnet=Mirai" -> "botnet=Sora" [label="variant-of",];"botnet=Owari" [label="botnet\nOwari",shape=box,style=filled,color=deepskyblue];"botnet=Owari" -> "malpedia=Owari" [label="similar",dir="both"];"botnet=Owari" -> "botnet=Mirai" [label="variant-of",];"botnet=Owari" -> "tool=Mirai" [label="variant-of",];"botnet=Owari" -> "botnet=Sora" [label="variant-of",];"tool=Mirai" [label="tool\nMirai",shape=box,style=filled,color=deepskyblue];"tool=Mirai" -> "botnet=Owari" [label="variant-of",];"tool=Mirai" -> "botnet=Sora" [label="variant-of",];} diff --git a/static/graphs/025ab0ce-bffc-11e8-be19-d70ec22c5d56.png b/static/graphs/025ab0ce-bffc-11e8-be19-d70ec22c5d56.png new file mode 100644 index 0000000..8c68981 Binary files /dev/null and b/static/graphs/025ab0ce-bffc-11e8-be19-d70ec22c5d56.png differ diff --git a/static/graphs/025bdaa9-897d-4bad-afa6-013ba5734653 b/static/graphs/025bdaa9-897d-4bad-afa6-013ba5734653 new file mode 100644 index 0000000..f96f779 --- /dev/null +++ b/static/graphs/025bdaa9-897d-4bad-afa6-013ba5734653 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=NEODYMIUM - G0055" [label="mitre-enterprise-attack-intrusion-set\nNEODYMIUM - G0055",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=NEODYMIUM - G0055" -> "microsoft-activity-group=NEODYMIUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=NEODYMIUM - G0055" -> "threat-actor=NEODYMIUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=NEODYMIUM - G0055" -> "mitre-enterprise-attack-malware=Wingbird - S0176" [label="uses",];"microsoft-activity-group=NEODYMIUM" [label="microsoft-activity-group\nNEODYMIUM",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=Wingbird - S0176" [label="mitre-enterprise-attack-malware\nWingbird - S0176",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Wingbird - S0176" -> "mitre-enterprise-attack-attack-pattern=DLL Side-Loading - T1073" [label="uses",];"threat-actor=NEODYMIUM" [label="threat-actor\nNEODYMIUM",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/025bdaa9-897d-4bad-afa6-013ba5734653.png b/static/graphs/025bdaa9-897d-4bad-afa6-013ba5734653.png new file mode 100644 index 0000000..67f6ea6 Binary files /dev/null and b/static/graphs/025bdaa9-897d-4bad-afa6-013ba5734653.png differ diff --git a/static/graphs/0286e80e-b0ed-464f-ad62-beec8536d0cb b/static/graphs/0286e80e-b0ed-464f-ad62-beec8536d0cb new file mode 100644 index 0000000..21cfc94 --- /dev/null +++ b/static/graphs/0286e80e-b0ed-464f-ad62-beec8536d0cb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Hurricane Panda" [label="threat-actor\nHurricane Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Hurricane Panda" -> "mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" [label="similar",dir="both"];"threat-actor=Hurricane Panda" -> "threat-actor=Shell Crew" [label="similar",dir="both"];"threat-actor=Hurricane Panda" -> "threat-actor=Codoso" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" [label="mitre-enterprise-attack-intrusion-set\nDeep Panda - G0009",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"threat-actor=Codoso" [label="threat-actor\nCodoso",shape=octagon,style=filled,color=indianred1];"threat-actor=Shell Crew" [label="threat-actor\nShell Crew",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/0286e80e-b0ed-464f-ad62-beec8536d0cb.png b/static/graphs/0286e80e-b0ed-464f-ad62-beec8536d0cb.png new file mode 100644 index 0000000..2c08bd5 Binary files /dev/null and b/static/graphs/0286e80e-b0ed-464f-ad62-beec8536d0cb.png differ diff --git a/static/graphs/028ad431-84c5-4eb7-a364-2b797c234f88 b/static/graphs/028ad431-84c5-4eb7-a364-2b797c234f88 new file mode 100644 index 0000000..d56df20 --- /dev/null +++ b/static/graphs/028ad431-84c5-4eb7-a364-2b797c234f88 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1054" [label="mitre-pre-attack-attack-pattern\nAcquire OSINT data sets and information - PRE-T1054",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1054" -> "mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" [label="mitre-pre-attack-attack-pattern\nAcquire OSINT data sets and information - PRE-T1043",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" -> "mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1054" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" -> "mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1024" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1024" [label="mitre-pre-attack-attack-pattern\nAcquire OSINT data sets and information - PRE-T1024",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1024" -> "mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" [label="related-to",];} diff --git a/static/graphs/028ad431-84c5-4eb7-a364-2b797c234f88.png b/static/graphs/028ad431-84c5-4eb7-a364-2b797c234f88.png new file mode 100644 index 0000000..a67e0f1 Binary files /dev/null and b/static/graphs/028ad431-84c5-4eb7-a364-2b797c234f88.png differ diff --git a/static/graphs/02f0f92a-0a51-4c94-9bda-6437b9a93f22 b/static/graphs/02f0f92a-0a51-4c94-9bda-6437b9a93f22 new file mode 100644 index 0000000..c2ffb87 --- /dev/null +++ b/static/graphs/02f0f92a-0a51-4c94-9bda-6437b9a93f22 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Space after Filename Mitigation - T1151" [label="mitre-enterprise-attack-course-of-action\nSpace after Filename Mitigation - T1151",shape=ellipse];"mitre-enterprise-attack-course-of-action=Space after Filename Mitigation - T1151" -> "mitre-enterprise-attack-attack-pattern=Space after Filename - T1151" [label="mitigates",];} diff --git a/static/graphs/02f0f92a-0a51-4c94-9bda-6437b9a93f22.png b/static/graphs/02f0f92a-0a51-4c94-9bda-6437b9a93f22.png new file mode 100644 index 0000000..e0c4aa6 Binary files /dev/null and b/static/graphs/02f0f92a-0a51-4c94-9bda-6437b9a93f22.png differ diff --git a/static/graphs/02fb1edd-59a5-4a2f-a48c-5f1d66b2c6cf b/static/graphs/02fb1edd-59a5-4a2f-a48c-5f1d66b2c6cf new file mode 100644 index 0000000..35351e5 --- /dev/null +++ b/static/graphs/02fb1edd-59a5-4a2f-a48c-5f1d66b2c6cf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Information Content Security:Unauthorised modification of information" [label="rsit\nInformation Content Security:Unauthorised modification of information",shape=ellipse];} diff --git a/static/graphs/02fb1edd-59a5-4a2f-a48c-5f1d66b2c6cf.png b/static/graphs/02fb1edd-59a5-4a2f-a48c-5f1d66b2c6cf.png new file mode 100644 index 0000000..340bcf8 Binary files /dev/null and b/static/graphs/02fb1edd-59a5-4a2f-a48c-5f1d66b2c6cf.png differ diff --git a/static/graphs/03342581-f790-4f03-ba41-e82e67392e23 b/static/graphs/03342581-f790-4f03-ba41-e82e67392e23 new file mode 100644 index 0000000..73e8289 --- /dev/null +++ b/static/graphs/03342581-f790-4f03-ba41-e82e67392e23 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Net - S0039" [label="mitre-enterprise-attack-tool\nNet - S0039",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Net - S0039" -> "mitre-enterprise-attack-attack-pattern=Password Policy Discovery - T1201" [label="uses",];} diff --git a/static/graphs/03342581-f790-4f03-ba41-e82e67392e23.png b/static/graphs/03342581-f790-4f03-ba41-e82e67392e23.png new file mode 100644 index 0000000..4e8945e Binary files /dev/null and b/static/graphs/03342581-f790-4f03-ba41-e82e67392e23.png differ diff --git a/static/graphs/03506554-5f37-4f8f-9ce4-0e9f01a1b484 b/static/graphs/03506554-5f37-4f8f-9ce4-0e9f01a1b484 new file mode 100644 index 0000000..02db3f2 --- /dev/null +++ b/static/graphs/03506554-5f37-4f8f-9ce4-0e9f01a1b484 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Elderwood - G0066" [label="mitre-enterprise-attack-intrusion-set\nElderwood - G0066",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Elderwood - G0066" -> "threat-actor=Beijing Group" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Elderwood - G0066" -> "mitre-enterprise-attack-attack-pattern=Drive-by Compromise - T1189" [label="uses",];"threat-actor=Beijing Group" [label="threat-actor\nBeijing Group",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/03506554-5f37-4f8f-9ce4-0e9f01a1b484.png b/static/graphs/03506554-5f37-4f8f-9ce4-0e9f01a1b484.png new file mode 100644 index 0000000..e00de19 Binary files /dev/null and b/static/graphs/03506554-5f37-4f8f-9ce4-0e9f01a1b484.png differ diff --git a/static/graphs/039814a0-88de-46c5-a4fb-b293db21880a b/static/graphs/039814a0-88de-46c5-a4fb-b293db21880a new file mode 100644 index 0000000..8e2b451 --- /dev/null +++ b/static/graphs/039814a0-88de-46c5-a4fb-b293db21880a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Wiarp - S0206" [label="mitre-enterprise-attack-malware\nWiarp - S0206",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Wiarp - S0206" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/039814a0-88de-46c5-a4fb-b293db21880a.png b/static/graphs/039814a0-88de-46c5-a4fb-b293db21880a.png new file mode 100644 index 0000000..f2151f8 Binary files /dev/null and b/static/graphs/039814a0-88de-46c5-a4fb-b293db21880a.png differ diff --git a/static/graphs/03a91686-c607-49a8-a4e2-2054833c0013 b/static/graphs/03a91686-c607-49a8-a4e2-2054833c0013 new file mode 100644 index 0000000..5191178 --- /dev/null +++ b/static/graphs/03a91686-c607-49a8-a4e2-2054833c0013 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=NanoLocker" [label="ransomware\nNanoLocker",shape=box,style=filled,color=deepskyblue];"ransomware=NanoLocker" -> "malpedia=NanoLocker" [label="similar",dir="both"];} diff --git a/static/graphs/03a91686-c607-49a8-a4e2-2054833c0013.png b/static/graphs/03a91686-c607-49a8-a4e2-2054833c0013.png new file mode 100644 index 0000000..85afd1a Binary files /dev/null and b/static/graphs/03a91686-c607-49a8-a4e2-2054833c0013.png differ diff --git a/static/graphs/03c0c586-50ed-45a7-95f4-f496d7eb5330 b/static/graphs/03c0c586-50ed-45a7-95f4-f496d7eb5330 new file mode 100644 index 0000000..d5a091e --- /dev/null +++ b/static/graphs/03c0c586-50ed-45a7-95f4-f496d7eb5330 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=HISTCONTROL Mitigation - T1148" [label="mitre-enterprise-attack-course-of-action\nHISTCONTROL Mitigation - T1148",shape=ellipse];"mitre-enterprise-attack-course-of-action=HISTCONTROL Mitigation - T1148" -> "mitre-enterprise-attack-attack-pattern=HISTCONTROL - T1148" [label="mitigates",];} diff --git a/static/graphs/03c0c586-50ed-45a7-95f4-f496d7eb5330.png b/static/graphs/03c0c586-50ed-45a7-95f4-f496d7eb5330.png new file mode 100644 index 0000000..71ffc1f Binary files /dev/null and b/static/graphs/03c0c586-50ed-45a7-95f4-f496d7eb5330.png differ diff --git a/static/graphs/03f4a766-7a21-4b5e-9ccf-e0cf422ab983 b/static/graphs/03f4a766-7a21-4b5e-9ccf-e0cf422ab983 new file mode 100644 index 0000000..229dff0 --- /dev/null +++ b/static/graphs/03f4a766-7a21-4b5e-9ccf-e0cf422ab983 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Acquire or compromise 3rd party signing certificates - PRE-T1109" [label="mitre-pre-attack-attack-pattern\nAcquire or compromise 3rd party signing certificates - PRE-T1109",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire or compromise 3rd party signing certificates - PRE-T1109" -> "mitre-pre-attack-attack-pattern=Acquire or compromise 3rd party signing certificates - PRE-T1087" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire or compromise 3rd party signing certificates - PRE-T1087" [label="mitre-pre-attack-attack-pattern\nAcquire or compromise 3rd party signing certificates - PRE-T1087",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire or compromise 3rd party signing certificates - PRE-T1087" -> "mitre-pre-attack-attack-pattern=Acquire or compromise 3rd party signing certificates - PRE-T1109" [label="related-to",];} diff --git a/static/graphs/03f4a766-7a21-4b5e-9ccf-e0cf422ab983.png b/static/graphs/03f4a766-7a21-4b5e-9ccf-e0cf422ab983.png new file mode 100644 index 0000000..92293a9 Binary files /dev/null and b/static/graphs/03f4a766-7a21-4b5e-9ccf-e0cf422ab983.png differ diff --git a/static/graphs/04585cd8-54ae-420f-9191-8ddb9b88a80c b/static/graphs/04585cd8-54ae-420f-9191-8ddb9b88a80c new file mode 100644 index 0000000..28f6553 --- /dev/null +++ b/static/graphs/04585cd8-54ae-420f-9191-8ddb9b88a80c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=SynAck" [label="ransomware\nSynAck",shape=box,style=filled,color=deepskyblue];"ransomware=SynAck" -> "malpedia=SynAck" [label="similar",dir="both"];} diff --git a/static/graphs/04585cd8-54ae-420f-9191-8ddb9b88a80c.png b/static/graphs/04585cd8-54ae-420f-9191-8ddb9b88a80c.png new file mode 100644 index 0000000..d0017fb Binary files /dev/null and b/static/graphs/04585cd8-54ae-420f-9191-8ddb9b88a80c.png differ diff --git a/static/graphs/0472af99-f25c-4abe-9fce-010fa3450e72 b/static/graphs/0472af99-f25c-4abe-9fce-010fa3450e72 new file mode 100644 index 0000000..f763884 --- /dev/null +++ b/static/graphs/0472af99-f25c-4abe-9fce-010fa3450e72 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Credentials in Files Mitigation - T1081" [label="mitre-enterprise-attack-course-of-action\nCredentials in Files Mitigation - T1081",shape=ellipse];"mitre-enterprise-attack-course-of-action=Credentials in Files Mitigation - T1081" -> "mitre-enterprise-attack-attack-pattern=Credentials in Files - T1081" [label="mitigates",];} diff --git a/static/graphs/0472af99-f25c-4abe-9fce-010fa3450e72.png b/static/graphs/0472af99-f25c-4abe-9fce-010fa3450e72.png new file mode 100644 index 0000000..6f460b0 Binary files /dev/null and b/static/graphs/0472af99-f25c-4abe-9fce-010fa3450e72.png differ diff --git a/static/graphs/049ff071-0b3c-4712-95d2-d21c6aa54501 b/static/graphs/049ff071-0b3c-4712-95d2-d21c6aa54501 new file mode 100644 index 0000000..cabad43 --- /dev/null +++ b/static/graphs/049ff071-0b3c-4712-95d2-d21c6aa54501 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=MURKYTOP - S0233" [label="mitre-enterprise-attack-malware\nMURKYTOP - S0233",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=MURKYTOP - S0233" -> "mitre-enterprise-attack-attack-pattern=Account Discovery - T1087" [label="uses",];} diff --git a/static/graphs/049ff071-0b3c-4712-95d2-d21c6aa54501.png b/static/graphs/049ff071-0b3c-4712-95d2-d21c6aa54501.png new file mode 100644 index 0000000..30637b9 Binary files /dev/null and b/static/graphs/049ff071-0b3c-4712-95d2-d21c6aa54501.png differ diff --git a/static/graphs/05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1 b/static/graphs/05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1 new file mode 100644 index 0000000..c0f7265 --- /dev/null +++ b/static/graphs/05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=DroidJack RAT - MOB-S0036" [label="mitre-mobile-attack-malware\nDroidJack RAT - MOB-S0036",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=DroidJack RAT - MOB-S0036" -> "mitre-mobile-attack-attack-pattern=Repackaged Application - MOB-T1047" [label="uses",];"mitre-mobile-attack-malware=DroidJack RAT - MOB-S0036" -> "mitre-mobile-attack-attack-pattern=Microphone or Camera Recordings - MOB-T1032" [label="uses",];} diff --git a/static/graphs/05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1.png b/static/graphs/05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1.png new file mode 100644 index 0000000..2b0be82 Binary files /dev/null and b/static/graphs/05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1.png differ diff --git a/static/graphs/05f5a051-d7a2-4757-a2f0-d685334d9374 b/static/graphs/05f5a051-d7a2-4757-a2f0-d685334d9374 new file mode 100644 index 0000000..c525803 --- /dev/null +++ b/static/graphs/05f5a051-d7a2-4757-a2f0-d685334d9374 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=Rootnik" [label="android\nRootnik",shape=box,style=filled,color=deepskyblue];"android=Rootnik" -> "malpedia=Rootnik" [label="similar",dir="both"];} diff --git a/static/graphs/05f5a051-d7a2-4757-a2f0-d685334d9374.png b/static/graphs/05f5a051-d7a2-4757-a2f0-d685334d9374.png new file mode 100644 index 0000000..166b919 Binary files /dev/null and b/static/graphs/05f5a051-d7a2-4757-a2f0-d685334d9374.png differ diff --git a/static/graphs/06160d81-62be-46e5-aa37-4b9c645ffa31 b/static/graphs/06160d81-62be-46e5-aa37-4b9c645ffa31 new file mode 100644 index 0000000..82c75b3 --- /dev/null +++ b/static/graphs/06160d81-62be-46e5-aa37-4b9c645ffa31 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Exploitation for Credential Access Mitigation - T1212" [label="mitre-enterprise-attack-course-of-action\nExploitation for Credential Access Mitigation - T1212",shape=ellipse];"mitre-enterprise-attack-course-of-action=Exploitation for Credential Access Mitigation - T1212" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Credential Access - T1212" [label="mitigates",];} diff --git a/static/graphs/06160d81-62be-46e5-aa37-4b9c645ffa31.png b/static/graphs/06160d81-62be-46e5-aa37-4b9c645ffa31.png new file mode 100644 index 0000000..09ce111 Binary files /dev/null and b/static/graphs/06160d81-62be-46e5-aa37-4b9c645ffa31.png differ diff --git a/static/graphs/0640214c-95af-4c04-a574-2a1ba6dda00b b/static/graphs/0640214c-95af-4c04-a574-2a1ba6dda00b new file mode 100644 index 0000000..5d79f46 --- /dev/null +++ b/static/graphs/0640214c-95af-4c04-a574-2a1ba6dda00b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Query Registry Mitigation - T1012" [label="mitre-enterprise-attack-course-of-action\nQuery Registry Mitigation - T1012",shape=ellipse];"mitre-enterprise-attack-course-of-action=Query Registry Mitigation - T1012" -> "mitre-enterprise-attack-attack-pattern=Query Registry - T1012" [label="mitigates",];} diff --git a/static/graphs/0640214c-95af-4c04-a574-2a1ba6dda00b.png b/static/graphs/0640214c-95af-4c04-a574-2a1ba6dda00b.png new file mode 100644 index 0000000..50765d6 Binary files /dev/null and b/static/graphs/0640214c-95af-4c04-a574-2a1ba6dda00b.png differ diff --git a/static/graphs/066d25c1-71bd-4bd4-8ca7-edbba00063f4 b/static/graphs/066d25c1-71bd-4bd4-8ca7-edbba00063f4 new file mode 100644 index 0000000..f405fc6 --- /dev/null +++ b/static/graphs/066d25c1-71bd-4bd4-8ca7-edbba00063f4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Shell Crew" [label="threat-actor\nShell Crew",shape=octagon,style=filled,color=indianred1];"threat-actor=Shell Crew" -> "mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" [label="similar",dir="both"];"threat-actor=Shell Crew" -> "threat-actor=Hurricane Panda" [label="similar",dir="both"];"threat-actor=Shell Crew" -> "threat-actor=Codoso" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" [label="mitre-enterprise-attack-intrusion-set\nDeep Panda - G0009",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"threat-actor=Codoso" [label="threat-actor\nCodoso",shape=octagon,style=filled,color=indianred1];"threat-actor=Hurricane Panda" [label="threat-actor\nHurricane Panda",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/066d25c1-71bd-4bd4-8ca7-edbba00063f4.png b/static/graphs/066d25c1-71bd-4bd4-8ca7-edbba00063f4.png new file mode 100644 index 0000000..943837f Binary files /dev/null and b/static/graphs/066d25c1-71bd-4bd4-8ca7-edbba00063f4.png differ diff --git a/static/graphs/066f8ad3-0c99-43eb-990c-8fae2c232f62 b/static/graphs/066f8ad3-0c99-43eb-990c-8fae2c232f62 new file mode 100644 index 0000000..ea825e1 --- /dev/null +++ b/static/graphs/066f8ad3-0c99-43eb-990c-8fae2c232f62 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Bedep" [label="tool\nBedep",shape=box,style=filled,color=deepskyblue];"tool=Bedep" -> "malpedia=Bedep" [label="similar",dir="both"];} diff --git a/static/graphs/066f8ad3-0c99-43eb-990c-8fae2c232f62.png b/static/graphs/066f8ad3-0c99-43eb-990c-8fae2c232f62.png new file mode 100644 index 0000000..a89a7b9 Binary files /dev/null and b/static/graphs/066f8ad3-0c99-43eb-990c-8fae2c232f62.png differ diff --git a/static/graphs/06824aa2-94a5-474c-97f6-57c2e983d885 b/static/graphs/06824aa2-94a5-474c-97f6-57c2e983d885 new file mode 100644 index 0000000..4c5d342 --- /dev/null +++ b/static/graphs/06824aa2-94a5-474c-97f6-57c2e983d885 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Login Item Mitigation - T1162" [label="mitre-enterprise-attack-course-of-action\nLogin Item Mitigation - T1162",shape=ellipse];"mitre-enterprise-attack-course-of-action=Login Item Mitigation - T1162" -> "mitre-enterprise-attack-attack-pattern=Login Item - T1162" [label="mitigates",];} diff --git a/static/graphs/06824aa2-94a5-474c-97f6-57c2e983d885.png b/static/graphs/06824aa2-94a5-474c-97f6-57c2e983d885.png new file mode 100644 index 0000000..acd7523 Binary files /dev/null and b/static/graphs/06824aa2-94a5-474c-97f6-57c2e983d885.png differ diff --git a/static/graphs/06953055-92ed-4936-8ffd-d9d72ab6bef6 b/static/graphs/06953055-92ed-4936-8ffd-d9d72ab6bef6 new file mode 100644 index 0000000..74b2dfe --- /dev/null +++ b/static/graphs/06953055-92ed-4936-8ffd-d9d72ab6bef6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Hikit" [label="tool\nHikit",shape=box,style=filled,color=deepskyblue];"tool=Hikit" -> "mitre-enterprise-attack-malware=Hikit - S0009" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Hikit - S0009" [label="mitre-enterprise-attack-malware\nHikit - S0009",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Hikit - S0009" -> "mitre-enterprise-attack-attack-pattern=Connection Proxy - T1090" [label="uses",];} diff --git a/static/graphs/06953055-92ed-4936-8ffd-d9d72ab6bef6.png b/static/graphs/06953055-92ed-4936-8ffd-d9d72ab6bef6.png new file mode 100644 index 0000000..bbadcd5 Binary files /dev/null and b/static/graphs/06953055-92ed-4936-8ffd-d9d72ab6bef6.png differ diff --git a/static/graphs/06d735e7-1db1-4dbe-ab4b-acbe419f902b b/static/graphs/06d735e7-1db1-4dbe-ab4b-acbe419f902b new file mode 100644 index 0000000..4dee016 --- /dev/null +++ b/static/graphs/06d735e7-1db1-4dbe-ab4b-acbe419f902b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Orz - S0229" [label="mitre-enterprise-attack-malware\nOrz - S0229",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Orz - S0229" -> "malpedia=AIRBREAK" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Orz - S0229" -> "mitre-enterprise-attack-attack-pattern=System Information Discovery - T1082" [label="uses",];} diff --git a/static/graphs/06d735e7-1db1-4dbe-ab4b-acbe419f902b.png b/static/graphs/06d735e7-1db1-4dbe-ab4b-acbe419f902b.png new file mode 100644 index 0000000..326fa88 Binary files /dev/null and b/static/graphs/06d735e7-1db1-4dbe-ab4b-acbe419f902b.png differ diff --git a/static/graphs/0722cd65-0c83-4c89-9502-539198467ab1 b/static/graphs/0722cd65-0c83-4c89-9502-539198467ab1 new file mode 100644 index 0000000..bd8ed29 --- /dev/null +++ b/static/graphs/0722cd65-0c83-4c89-9502-539198467ab1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1044" [label="mitre-pre-attack-attack-pattern\nIdentify job postings and needs/gaps - PRE-T1044",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1044" -> "mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1055" [label="related-to",];"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1055" [label="mitre-pre-attack-attack-pattern\nIdentify job postings and needs/gaps - PRE-T1055",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1055" -> "mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1025" [label="related-to",];"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1025" [label="mitre-pre-attack-attack-pattern\nIdentify job postings and needs/gaps - PRE-T1025",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1025" -> "mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1055" [label="related-to",];} diff --git a/static/graphs/0722cd65-0c83-4c89-9502-539198467ab1.png b/static/graphs/0722cd65-0c83-4c89-9502-539198467ab1.png new file mode 100644 index 0000000..f8c8872 Binary files /dev/null and b/static/graphs/0722cd65-0c83-4c89-9502-539198467ab1.png differ diff --git a/static/graphs/073cc04d-ac46-4f5a-85d7-83a91ecd6a19 b/static/graphs/073cc04d-ac46-4f5a-85d7-83a91ecd6a19 new file mode 100644 index 0000000..776c785 --- /dev/null +++ b/static/graphs/073cc04d-ac46-4f5a-85d7-83a91ecd6a19 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Setuid and Setgid Mitigation - T1166" [label="mitre-enterprise-attack-course-of-action\nSetuid and Setgid Mitigation - T1166",shape=ellipse];"mitre-enterprise-attack-course-of-action=Setuid and Setgid Mitigation - T1166" -> "mitre-enterprise-attack-attack-pattern=Setuid and Setgid - T1166" [label="mitigates",];} diff --git a/static/graphs/073cc04d-ac46-4f5a-85d7-83a91ecd6a19.png b/static/graphs/073cc04d-ac46-4f5a-85d7-83a91ecd6a19.png new file mode 100644 index 0000000..f457700 Binary files /dev/null and b/static/graphs/073cc04d-ac46-4f5a-85d7-83a91ecd6a19.png differ diff --git a/static/graphs/07b10419-e8b5-4b5f-a179-77fc9b127dc6 b/static/graphs/07b10419-e8b5-4b5f-a179-77fc9b127dc6 new file mode 100644 index 0000000..019530a --- /dev/null +++ b/static/graphs/07b10419-e8b5-4b5f-a179-77fc9b127dc6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Kelihos" [label="botnet\nKelihos",shape=box,style=filled,color=deepskyblue];"botnet=Kelihos" -> "malpedia=Kelihos" [label="similar",dir="both"];} diff --git a/static/graphs/07b10419-e8b5-4b5f-a179-77fc9b127dc6.png b/static/graphs/07b10419-e8b5-4b5f-a179-77fc9b127dc6.png new file mode 100644 index 0000000..3d9456a Binary files /dev/null and b/static/graphs/07b10419-e8b5-4b5f-a179-77fc9b127dc6.png differ diff --git a/static/graphs/07e3260b-d80c-4c86-bd28-8adc111bbec6 b/static/graphs/07e3260b-d80c-4c86-bd28-8adc111bbec6 new file mode 100644 index 0000000..27c4125 --- /dev/null +++ b/static/graphs/07e3260b-d80c-4c86-bd28-8adc111bbec6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Trickbot" [label="banker\nTrickbot",shape=box,style=filled,color=deepskyblue];"banker=Trickbot" -> "tool=Trick Bot" [label="similar",dir="both"];"banker=Trickbot" -> "malpedia=TrickBot" [label="similar",dir="both"];"tool=Trick Bot" [label="tool\nTrick Bot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/07e3260b-d80c-4c86-bd28-8adc111bbec6.png b/static/graphs/07e3260b-d80c-4c86-bd28-8adc111bbec6.png new file mode 100644 index 0000000..000ff90 Binary files /dev/null and b/static/graphs/07e3260b-d80c-4c86-bd28-8adc111bbec6.png differ diff --git a/static/graphs/07ffcf9f-b9c0-4b22-af4b-78527427e6f5 b/static/graphs/07ffcf9f-b9c0-4b22-af4b-78527427e6f5 new file mode 100644 index 0000000..45d8d74 --- /dev/null +++ b/static/graphs/07ffcf9f-b9c0-4b22-af4b-78527427e6f5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=GootKit" [label="tool\nGootKit",shape=box,style=filled,color=deepskyblue];"tool=GootKit" -> "malpedia=GootKit" [label="similar",dir="both"];} diff --git a/static/graphs/07ffcf9f-b9c0-4b22-af4b-78527427e6f5.png b/static/graphs/07ffcf9f-b9c0-4b22-af4b-78527427e6f5.png new file mode 100644 index 0000000..d58eee9 Binary files /dev/null and b/static/graphs/07ffcf9f-b9c0-4b22-af4b-78527427e6f5.png differ diff --git a/static/graphs/083bb47b-02c8-4423-81a2-f9ef58572974 b/static/graphs/083bb47b-02c8-4423-81a2-f9ef58572974 new file mode 100644 index 0000000..5e4dbfe --- /dev/null +++ b/static/graphs/083bb47b-02c8-4423-81a2-f9ef58572974 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Backdoor.Oldrea - S0093" [label="mitre-enterprise-attack-malware\nBackdoor.Oldrea - S0093",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Backdoor.Oldrea - S0093" -> "tool=Havex RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Backdoor.Oldrea - S0093" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];"tool=Havex RAT" [label="tool\nHavex RAT",shape=box,style=filled,color=deepskyblue];"tool=Havex RAT" -> "malpedia=Havex RAT" [label="similar",dir="both"];} diff --git a/static/graphs/083bb47b-02c8-4423-81a2-f9ef58572974.png b/static/graphs/083bb47b-02c8-4423-81a2-f9ef58572974.png new file mode 100644 index 0000000..762cbd5 Binary files /dev/null and b/static/graphs/083bb47b-02c8-4423-81a2-f9ef58572974.png differ diff --git a/static/graphs/0852567d-7958-4f4b-8947-4f840ec8d57d b/static/graphs/0852567d-7958-4f4b-8947-4f840ec8d57d new file mode 100644 index 0000000..d35694c --- /dev/null +++ b/static/graphs/0852567d-7958-4f4b-8947-4f840ec8d57d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=DOGCALL - S0213" [label="mitre-enterprise-attack-malware\nDOGCALL - S0213",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DOGCALL - S0213" -> "tool=DOGCALL" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DOGCALL - S0213" -> "mitre-enterprise-attack-attack-pattern=Screen Capture - T1113" [label="uses",];"tool=DOGCALL" [label="tool\nDOGCALL",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/0852567d-7958-4f4b-8947-4f840ec8d57d.png b/static/graphs/0852567d-7958-4f4b-8947-4f840ec8d57d.png new file mode 100644 index 0000000..fa17cf1 Binary files /dev/null and b/static/graphs/0852567d-7958-4f4b-8947-4f840ec8d57d.png differ diff --git a/static/graphs/08d20cd2-f084-45ee-8558-fa6ef5a18519 b/static/graphs/08d20cd2-f084-45ee-8558-fa6ef5a18519 new file mode 100644 index 0000000..29bbddd --- /dev/null +++ b/static/graphs/08d20cd2-f084-45ee-8558-fa6ef5a18519 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Downdelph - S0134" [label="mitre-enterprise-attack-malware\nDowndelph - S0134",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Downdelph - S0134" -> "tool=Downdelph" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Downdelph - S0134" -> "malpedia=Downdelph" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Downdelph - S0134" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];"tool=Downdelph" [label="tool\nDowndelph",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/08d20cd2-f084-45ee-8558-fa6ef5a18519.png b/static/graphs/08d20cd2-f084-45ee-8558-fa6ef5a18519.png new file mode 100644 index 0000000..d6857b2 Binary files /dev/null and b/static/graphs/08d20cd2-f084-45ee-8558-fa6ef5a18519.png differ diff --git a/static/graphs/08e2c9ef-aa62-429f-a6e5-e901ff6883cd b/static/graphs/08e2c9ef-aa62-429f-a6e5-e901ff6883cd new file mode 100644 index 0000000..5ba0742 --- /dev/null +++ b/static/graphs/08e2c9ef-aa62-429f-a6e5-e901ff6883cd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=HTTPBrowser" [label="tool\nHTTPBrowser",shape=box,style=filled,color=deepskyblue];"tool=HTTPBrowser" -> "mitre-enterprise-attack-malware=HTTPBrowser - S0070" [label="similar",dir="both"];"mitre-enterprise-attack-malware=HTTPBrowser - S0070" [label="mitre-enterprise-attack-malware\nHTTPBrowser - S0070",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=HTTPBrowser - S0070" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/08e2c9ef-aa62-429f-a6e5-e901ff6883cd.png b/static/graphs/08e2c9ef-aa62-429f-a6e5-e901ff6883cd.png new file mode 100644 index 0000000..e05a65c Binary files /dev/null and b/static/graphs/08e2c9ef-aa62-429f-a6e5-e901ff6883cd.png differ diff --git a/static/graphs/090242d7-73fc-4738-af68-20162f7a5aae b/static/graphs/090242d7-73fc-4738-af68-20162f7a5aae new file mode 100644 index 0000000..3282b29 --- /dev/null +++ b/static/graphs/090242d7-73fc-4738-af68-20162f7a5aae @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=APT17 - G0025" [label="mitre-enterprise-attack-intrusion-set\nAPT17 - G0025",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT17 - G0025" -> "mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT17 - G0025" -> "threat-actor=Axiom" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT17 - G0025" -> "threat-actor=Aurora Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT17 - G0025" -> "mitre-enterprise-attack-intrusion-set=Axiom - G0001" [label="similar",dir="both"];"mitre-pre-attack-intrusion-set=APT17 - G0025" [label="mitre-pre-attack-intrusion-set\nAPT17 - G0025",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT17 - G0025" -> "mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" [label="uses",];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" [label="mitre-enterprise-attack-intrusion-set\nWinnti Group - G0044",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" [label="mitre-enterprise-attack-intrusion-set\nAxiom - G0001",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" -> "mitre-enterprise-attack-attack-pattern=Exploit Public-Facing Application - T1190" [label="uses",];"mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" [label="mitre-enterprise-attack-malware\nBLACKCOFFEE - S0069",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];"threat-actor=Aurora Panda" [label="threat-actor\nAurora Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Axiom" [label="threat-actor\nAxiom",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/090242d7-73fc-4738-af68-20162f7a5aae.png b/static/graphs/090242d7-73fc-4738-af68-20162f7a5aae.png new file mode 100644 index 0000000..2175a71 Binary files /dev/null and b/static/graphs/090242d7-73fc-4738-af68-20162f7a5aae.png differ diff --git a/static/graphs/091c9923-5939-4bde-9db5-56abfb51f1a2 b/static/graphs/091c9923-5939-4bde-9db5-56abfb51f1a2 new file mode 100644 index 0000000..ce26e8c --- /dev/null +++ b/static/graphs/091c9923-5939-4bde-9db5-56abfb51f1a2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=FileCoder" [label="ransomware\nFileCoder",shape=box,style=filled,color=deepskyblue];"ransomware=FileCoder" -> "ransomware=Patcher" [label="similar",dir="both"];"ransomware=FileCoder" -> "malpedia=Patcher" [label="similar",dir="both"];"ransomware=Patcher" [label="ransomware\nPatcher",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/091c9923-5939-4bde-9db5-56abfb51f1a2.png b/static/graphs/091c9923-5939-4bde-9db5-56abfb51f1a2.png new file mode 100644 index 0000000..82f7f51 Binary files /dev/null and b/static/graphs/091c9923-5939-4bde-9db5-56abfb51f1a2.png differ diff --git a/static/graphs/092f05e3-f7c0-4cd2-91be-3a8d6ed3cadc b/static/graphs/092f05e3-f7c0-4cd2-91be-3a8d6ed3cadc new file mode 100644 index 0000000..39af18b --- /dev/null +++ b/static/graphs/092f05e3-f7c0-4cd2-91be-3a8d6ed3cadc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1066" [label="mitre-pre-attack-attack-pattern\nAnalyze organizational skillsets and deficiencies - PRE-T1066",shape=ellipse];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1066" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" [label="related-to",];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1066" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1077" [label="related-to",];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1077" [label="mitre-pre-attack-attack-pattern\nAnalyze organizational skillsets and deficiencies - PRE-T1077",shape=ellipse];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1077" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" [label="related-to",];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" [label="mitre-pre-attack-attack-pattern\nAnalyze organizational skillsets and deficiencies - PRE-T1074",shape=ellipse];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1066" [label="related-to",];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1077" [label="related-to",];} diff --git a/static/graphs/092f05e3-f7c0-4cd2-91be-3a8d6ed3cadc.png b/static/graphs/092f05e3-f7c0-4cd2-91be-3a8d6ed3cadc.png new file mode 100644 index 0000000..c4576d4 Binary files /dev/null and b/static/graphs/092f05e3-f7c0-4cd2-91be-3a8d6ed3cadc.png differ diff --git a/static/graphs/0998045d-f96e-4284-95ce-3c8219707486 b/static/graphs/0998045d-f96e-4284-95ce-3c8219707486 new file mode 100644 index 0000000..aff8390 --- /dev/null +++ b/static/graphs/0998045d-f96e-4284-95ce-3c8219707486 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=SEASHARPEE - S0185" [label="mitre-enterprise-attack-malware\nSEASHARPEE - S0185",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SEASHARPEE - S0185" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/0998045d-f96e-4284-95ce-3c8219707486.png b/static/graphs/0998045d-f96e-4284-95ce-3c8219707486.png new file mode 100644 index 0000000..f4c3991 Binary files /dev/null and b/static/graphs/0998045d-f96e-4284-95ce-3c8219707486.png differ diff --git a/static/graphs/09b2cd76-c674-47cc-9f57-d2f2ad150a46 b/static/graphs/09b2cd76-c674-47cc-9f57-d2f2ad150a46 new file mode 100644 index 0000000..826c6dc --- /dev/null +++ b/static/graphs/09b2cd76-c674-47cc-9f57-d2f2ad150a46 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=POWRUNER - S0184" [label="mitre-enterprise-attack-malware\nPOWRUNER - S0184",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=POWRUNER - S0184" -> "malpedia=POWRUNER" [label="similar",dir="both"];"mitre-enterprise-attack-malware=POWRUNER - S0184" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/09b2cd76-c674-47cc-9f57-d2f2ad150a46.png b/static/graphs/09b2cd76-c674-47cc-9f57-d2f2ad150a46.png new file mode 100644 index 0000000..4583410 Binary files /dev/null and b/static/graphs/09b2cd76-c674-47cc-9f57-d2f2ad150a46.png differ diff --git a/static/graphs/09d1cad8-6b06-48d7-a968-5b17bbe9ca65 b/static/graphs/09d1cad8-6b06-48d7-a968-5b17bbe9ca65 new file mode 100644 index 0000000..21f321b --- /dev/null +++ b/static/graphs/09d1cad8-6b06-48d7-a968-5b17bbe9ca65 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Zeus VM" [label="banker\nZeus VM",shape=box,style=filled,color=deepskyblue];"banker=Zeus VM" -> "malpedia=VM Zeus" [label="similar",dir="both"];} diff --git a/static/graphs/09d1cad8-6b06-48d7-a968-5b17bbe9ca65.png b/static/graphs/09d1cad8-6b06-48d7-a968-5b17bbe9ca65.png new file mode 100644 index 0000000..f53dca1 Binary files /dev/null and b/static/graphs/09d1cad8-6b06-48d7-a968-5b17bbe9ca65.png differ diff --git a/static/graphs/0a32ceea-fa66-47ab-8bde-150dbd6d2e40 b/static/graphs/0a32ceea-fa66-47ab-8bde-150dbd6d2e40 new file mode 100644 index 0000000..643e7ad --- /dev/null +++ b/static/graphs/0a32ceea-fa66-47ab-8bde-150dbd6d2e40 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=CHOPSTICK" [label="tool\nCHOPSTICK",shape=box,style=filled,color=deepskyblue];"tool=CHOPSTICK" -> "mitre-enterprise-attack-malware=CHOPSTICK - S0023" [label="similar",dir="both"];"tool=CHOPSTICK" -> "mitre-mobile-attack-malware=X-Agent - MOB-S0030" [label="similar",dir="both"];"tool=CHOPSTICK" -> "tool=X-Agent" [label="similar",dir="both"];"tool=CHOPSTICK" -> "malpedia=X-Agent (Android)" [label="similar",dir="both"];"mitre-enterprise-attack-malware=CHOPSTICK - S0023" [label="mitre-enterprise-attack-malware\nCHOPSTICK - S0023",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CHOPSTICK - S0023" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="uses",];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" [label="mitre-mobile-attack-malware\nX-Agent - MOB-S0030",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" -> "mitre-mobile-attack-attack-pattern=Repackaged Application - MOB-T1047" [label="uses",];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" -> "mitre-mobile-attack-attack-pattern=Location Tracking - MOB-T1033" [label="uses",];"tool=X-Agent" [label="tool\nX-Agent",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/0a32ceea-fa66-47ab-8bde-150dbd6d2e40.png b/static/graphs/0a32ceea-fa66-47ab-8bde-150dbd6d2e40.png new file mode 100644 index 0000000..c0aeb82 Binary files /dev/null and b/static/graphs/0a32ceea-fa66-47ab-8bde-150dbd6d2e40.png differ diff --git a/static/graphs/0a52e73b-d7e9-45ae-9bda-46568f753931 b/static/graphs/0a52e73b-d7e9-45ae-9bda-46568f753931 new file mode 100644 index 0000000..ba2698e --- /dev/null +++ b/static/graphs/0a52e73b-d7e9-45ae-9bda-46568f753931 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Volgmer" [label="tool\nVolgmer",shape=box,style=filled,color=deepskyblue];"tool=Volgmer" -> "mitre-enterprise-attack-malware=Volgmer - S0180" [label="similar",dir="both"];"tool=Volgmer" -> "rat=FALLCHILL" [label="similar",dir="both"];"tool=Volgmer" -> "mitre-enterprise-attack-malware=FALLCHILL - S0181" [label="similar",dir="both"];"tool=Volgmer" -> "malpedia=Volgmer" [label="similar",dir="both"];"mitre-enterprise-attack-malware=FALLCHILL - S0181" [label="mitre-enterprise-attack-malware\nFALLCHILL - S0181",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=FALLCHILL - S0181" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];"mitre-enterprise-attack-malware=Volgmer - S0180" [label="mitre-enterprise-attack-malware\nVolgmer - S0180",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Volgmer - S0180" -> "mitre-enterprise-attack-attack-pattern=Standard Cryptographic Protocol - T1032" [label="uses",];"rat=FALLCHILL" [label="rat\nFALLCHILL",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/0a52e73b-d7e9-45ae-9bda-46568f753931.png b/static/graphs/0a52e73b-d7e9-45ae-9bda-46568f753931.png new file mode 100644 index 0000000..f7520fc Binary files /dev/null and b/static/graphs/0a52e73b-d7e9-45ae-9bda-46568f753931.png differ diff --git a/static/graphs/0a68f1f1-da74-4d28-8d9a-696c082706cc b/static/graphs/0a68f1f1-da74-4d28-8d9a-696c082706cc new file mode 100644 index 0000000..019850d --- /dev/null +++ b/static/graphs/0a68f1f1-da74-4d28-8d9a-696c082706cc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=certutil - S0160" [label="mitre-enterprise-attack-tool\ncertutil - S0160",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=certutil - S0160" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/0a68f1f1-da74-4d28-8d9a-696c082706cc.png b/static/graphs/0a68f1f1-da74-4d28-8d9a-696c082706cc.png new file mode 100644 index 0000000..58cb815 Binary files /dev/null and b/static/graphs/0a68f1f1-da74-4d28-8d9a-696c082706cc.png differ diff --git a/static/graphs/0a9c51e0-825d-4b9b-969d-ce86ed8ce3c3 b/static/graphs/0a9c51e0-825d-4b9b-969d-ce86ed8ce3c3 new file mode 100644 index 0000000..3a033a2 --- /dev/null +++ b/static/graphs/0a9c51e0-825d-4b9b-969d-ce86ed8ce3c3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Power Loader - S0177" [label="mitre-enterprise-attack-malware\nPower Loader - S0177",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Power Loader - S0177" -> "mitre-enterprise-attack-attack-pattern=Extra Window Memory Injection - T1181" [label="uses",];} diff --git a/static/graphs/0a9c51e0-825d-4b9b-969d-ce86ed8ce3c3.png b/static/graphs/0a9c51e0-825d-4b9b-969d-ce86ed8ce3c3.png new file mode 100644 index 0000000..6ebe0ed Binary files /dev/null and b/static/graphs/0a9c51e0-825d-4b9b-969d-ce86ed8ce3c3.png differ diff --git a/static/graphs/0b097926-2e1a-4134-8ab9-4c16d0cca0fc b/static/graphs/0b097926-2e1a-4134-8ab9-4c16d0cca0fc new file mode 100644 index 0000000..6878f49 --- /dev/null +++ b/static/graphs/0b097926-2e1a-4134-8ab9-4c16d0cca0fc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Licat" [label="banker\nLicat",shape=box,style=filled,color=deepskyblue];"banker=Licat" -> "malpedia=Murofet" [label="similar",dir="both"];} diff --git a/static/graphs/0b097926-2e1a-4134-8ab9-4c16d0cca0fc.png b/static/graphs/0b097926-2e1a-4134-8ab9-4c16d0cca0fc.png new file mode 100644 index 0000000..f4af41d Binary files /dev/null and b/static/graphs/0b097926-2e1a-4134-8ab9-4c16d0cca0fc.png differ diff --git a/static/graphs/0b32ec39-ba61-4864-9ebe-b4b0b73caf9a b/static/graphs/0b32ec39-ba61-4864-9ebe-b4b0b73caf9a new file mode 100644 index 0000000..9e2e4ef --- /dev/null +++ b/static/graphs/0b32ec39-ba61-4864-9ebe-b4b0b73caf9a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=TDTESS - S0164" [label="mitre-enterprise-attack-malware\nTDTESS - S0164",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TDTESS - S0164" -> "malpedia=TDTESS" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TDTESS - S0164" -> "mitre-enterprise-attack-attack-pattern=File Deletion - T1107" [label="uses",];} diff --git a/static/graphs/0b32ec39-ba61-4864-9ebe-b4b0b73caf9a.png b/static/graphs/0b32ec39-ba61-4864-9ebe-b4b0b73caf9a.png new file mode 100644 index 0000000..f0f1880 Binary files /dev/null and b/static/graphs/0b32ec39-ba61-4864-9ebe-b4b0b73caf9a.png differ diff --git a/static/graphs/0bbdf25b-30ff-4894-a1cd-49260d0dd2d9 b/static/graphs/0bbdf25b-30ff-4894-a1cd-49260d0dd2d9 new file mode 100644 index 0000000..ae4f925 --- /dev/null +++ b/static/graphs/0bbdf25b-30ff-4894-a1cd-49260d0dd2d9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=APT3 - G0022" [label="mitre-enterprise-attack-intrusion-set\nAPT3 - G0022",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT3 - G0022" -> "threat-actor=UPS" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT3 - G0022" -> "mitre-enterprise-attack-malware=PlugX - S0013" [label="uses",];"mitre-enterprise-attack-malware=PlugX - S0013" [label="mitre-enterprise-attack-malware\nPlugX - S0013",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PlugX - S0013" -> "rat=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "tool=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "malpedia=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "mitre-enterprise-attack-attack-pattern=Query Registry - T1012" [label="uses",];"threat-actor=UPS" [label="threat-actor\nUPS",shape=octagon,style=filled,color=indianred1];"rat=PlugX" [label="rat\nPlugX",shape=box,style=filled,color=deepskyblue];"tool=PlugX" [label="tool\nPlugX",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/0bbdf25b-30ff-4894-a1cd-49260d0dd2d9.png b/static/graphs/0bbdf25b-30ff-4894-a1cd-49260d0dd2d9.png new file mode 100644 index 0000000..5a5cbb4 Binary files /dev/null and b/static/graphs/0bbdf25b-30ff-4894-a1cd-49260d0dd2d9.png differ diff --git a/static/graphs/0bc3ce00-83bc-4a92-a042-79ffbc6af259 b/static/graphs/0bc3ce00-83bc-4a92-a042-79ffbc6af259 new file mode 100644 index 0000000..05627b2 --- /dev/null +++ b/static/graphs/0bc3ce00-83bc-4a92-a042-79ffbc6af259 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Windows Management Instrumentation Event Subscription Mitigation - T1084" [label="mitre-enterprise-attack-course-of-action\nWindows Management Instrumentation Event Subscription Mitigation - T1084",shape=ellipse];"mitre-enterprise-attack-course-of-action=Windows Management Instrumentation Event Subscription Mitigation - T1084" -> "mitre-enterprise-attack-attack-pattern=Windows Management Instrumentation Event Subscription - T1084" [label="mitigates",];} diff --git a/static/graphs/0bc3ce00-83bc-4a92-a042-79ffbc6af259.png b/static/graphs/0bc3ce00-83bc-4a92-a042-79ffbc6af259.png new file mode 100644 index 0000000..926fa0c Binary files /dev/null and b/static/graphs/0bc3ce00-83bc-4a92-a042-79ffbc6af259.png differ diff --git a/static/graphs/0bcc4ec1-a897-49a9-a9ff-c00df1d1209d b/static/graphs/0bcc4ec1-a897-49a9-a9ff-c00df1d1209d new file mode 100644 index 0000000..431b31f --- /dev/null +++ b/static/graphs/0bcc4ec1-a897-49a9-a9ff-c00df1d1209d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Malicious SMS Message - MOB-T1057" [label="mitre-mobile-attack-attack-pattern\nMalicious SMS Message - MOB-T1057",shape=ellipse];} diff --git a/static/graphs/0bcc4ec1-a897-49a9-a9ff-c00df1d1209d.png b/static/graphs/0bcc4ec1-a897-49a9-a9ff-c00df1d1209d.png new file mode 100644 index 0000000..306e3fd Binary files /dev/null and b/static/graphs/0bcc4ec1-a897-49a9-a9ff-c00df1d1209d.png differ diff --git a/static/graphs/0beabf44-e8d8-4ae4-9122-ef56369a2564 b/static/graphs/0beabf44-e8d8-4ae4-9122-ef56369a2564 new file mode 100644 index 0000000..a696742 --- /dev/null +++ b/static/graphs/0beabf44-e8d8-4ae4-9122-ef56369a2564 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=Use Recent OS Version - MOB-M1006" [label="mitre-mobile-attack-course-of-action\nUse Recent OS Version - MOB-M1006",shape=ellipse];"mitre-mobile-attack-course-of-action=Use Recent OS Version - MOB-M1006" -> "mitre-mobile-attack-attack-pattern=Attack PC via USB Connection - MOB-T1030" [label="mitigates",];"mitre-mobile-attack-course-of-action=Use Recent OS Version - MOB-M1006" -> "mitre-mobile-attack-attack-pattern=Abuse Accessibility Features - MOB-T1056" [label="mitigates",];} diff --git a/static/graphs/0beabf44-e8d8-4ae4-9122-ef56369a2564.png b/static/graphs/0beabf44-e8d8-4ae4-9122-ef56369a2564.png new file mode 100644 index 0000000..c869372 Binary files /dev/null and b/static/graphs/0beabf44-e8d8-4ae4-9122-ef56369a2564.png differ diff --git a/static/graphs/0c769e82-df28-4f65-97f5-7f3d88488f2e b/static/graphs/0c769e82-df28-4f65-97f5-7f3d88488f2e new file mode 100644 index 0000000..4ef327e --- /dev/null +++ b/static/graphs/0c769e82-df28-4f65-97f5-7f3d88488f2e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=Kemoge" [label="android\nKemoge",shape=box,style=filled,color=deepskyblue];"android=Kemoge" -> "mitre-mobile-attack-malware=Shedun - MOB-S0010" [label="similar",dir="both"];"mitre-mobile-attack-malware=Shedun - MOB-S0010" [label="mitre-mobile-attack-malware\nShedun - MOB-S0010",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Shedun - MOB-S0010" -> "mitre-mobile-attack-attack-pattern=Repackaged Application - MOB-T1047" [label="uses",];"mitre-mobile-attack-malware=Shedun - MOB-S0010" -> "mitre-mobile-attack-attack-pattern=Exploit OS Vulnerability - MOB-T1007" [label="uses",];} diff --git a/static/graphs/0c769e82-df28-4f65-97f5-7f3d88488f2e.png b/static/graphs/0c769e82-df28-4f65-97f5-7f3d88488f2e.png new file mode 100644 index 0000000..412d7c1 Binary files /dev/null and b/static/graphs/0c769e82-df28-4f65-97f5-7f3d88488f2e.png differ diff --git a/static/graphs/0c824410-58ff-49b2-9cf2-1c96b182bdf0 b/static/graphs/0c824410-58ff-49b2-9cf2-1c96b182bdf0 new file mode 100644 index 0000000..704603d --- /dev/null +++ b/static/graphs/0c824410-58ff-49b2-9cf2-1c96b182bdf0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Smoke Loader - S0226" [label="mitre-enterprise-attack-malware\nSmoke Loader - S0226",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Smoke Loader - S0226" -> "tool=Smoke Loader" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Smoke Loader - S0226" -> "malpedia=SmokeLoader" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Smoke Loader - S0226" -> "mitre-enterprise-attack-attack-pattern=Supply Chain Compromise - T1195" [label="uses",];"tool=Smoke Loader" [label="tool\nSmoke Loader",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/0c824410-58ff-49b2-9cf2-1c96b182bdf0.png b/static/graphs/0c824410-58ff-49b2-9cf2-1c96b182bdf0.png new file mode 100644 index 0000000..14328a8 Binary files /dev/null and b/static/graphs/0c824410-58ff-49b2-9cf2-1c96b182bdf0.png differ diff --git a/static/graphs/0c8465c0-d0b4-4670-992e-4eee8d7ff952 b/static/graphs/0c8465c0-d0b4-4670-992e-4eee8d7ff952 new file mode 100644 index 0000000..7201138 --- /dev/null +++ b/static/graphs/0c8465c0-d0b4-4670-992e-4eee8d7ff952 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=at - S0110" [label="mitre-enterprise-attack-tool\nat - S0110",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=at - S0110" -> "mitre-enterprise-attack-attack-pattern=Scheduled Task - T1053" [label="uses",];} diff --git a/static/graphs/0c8465c0-d0b4-4670-992e-4eee8d7ff952.png b/static/graphs/0c8465c0-d0b4-4670-992e-4eee8d7ff952.png new file mode 100644 index 0000000..d4dbe52 Binary files /dev/null and b/static/graphs/0c8465c0-d0b4-4670-992e-4eee8d7ff952.png differ diff --git a/static/graphs/0ca45163-e223-4167-b1af-f088ed14a93d b/static/graphs/0ca45163-e223-4167-b1af-f088ed14a93d new file mode 100644 index 0000000..55f9598 --- /dev/null +++ b/static/graphs/0ca45163-e223-4167-b1af-f088ed14a93d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Putter Panda" [label="threat-actor\nPutter Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Putter Panda" -> "mitre-enterprise-attack-intrusion-set=Putter Panda - G0024" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Putter Panda - G0024" [label="mitre-enterprise-attack-intrusion-set\nPutter Panda - G0024",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Putter Panda - G0024" -> "mitre-enterprise-attack-malware=3PARA RAT - S0066" [label="uses",];"mitre-enterprise-attack-malware=3PARA RAT - S0066" [label="mitre-enterprise-attack-malware\n3PARA RAT - S0066",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=3PARA RAT - S0066" -> "rat=3PARA RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=3PARA RAT - S0066" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];"rat=3PARA RAT" [label="rat\n3PARA RAT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/0ca45163-e223-4167-b1af-f088ed14a93d.png b/static/graphs/0ca45163-e223-4167-b1af-f088ed14a93d.png new file mode 100644 index 0000000..28f0c92 Binary files /dev/null and b/static/graphs/0ca45163-e223-4167-b1af-f088ed14a93d.png differ diff --git a/static/graphs/0cc1cf66-a838-4bdd-ace1-2da34a93520c b/static/graphs/0cc1cf66-a838-4bdd-ace1-2da34a93520c new file mode 100644 index 0000000..9a01fc9 --- /dev/null +++ b/static/graphs/0cc1cf66-a838-4bdd-ace1-2da34a93520c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Intrusion Attempts:Login attempts" [label="rsit\nIntrusion Attempts:Login attempts",shape=ellipse];"rsit=Intrusion Attempts:Login attempts" -> "mitre-enterprise-attack-attack-pattern=Brute Force - T1110" [label="similar",dir="both"];} diff --git a/static/graphs/0cc1cf66-a838-4bdd-ace1-2da34a93520c.png b/static/graphs/0cc1cf66-a838-4bdd-ace1-2da34a93520c.png new file mode 100644 index 0000000..5f79760 Binary files /dev/null and b/static/graphs/0cc1cf66-a838-4bdd-ace1-2da34a93520c.png differ diff --git a/static/graphs/0ce448de-c2bb-4c6e-9ad7-c4030f02b4d7 b/static/graphs/0ce448de-c2bb-4c6e-9ad7-c4030f02b4d7 new file mode 100644 index 0000000..64291ce --- /dev/null +++ b/static/graphs/0ce448de-c2bb-4c6e-9ad7-c4030f02b4d7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Zeus" [label="tool\nZeus",shape=box,style=filled,color=deepskyblue];"tool=Zeus" -> "banker=Zeus" [label="similar",dir="both"];"tool=Zeus" -> "botnet=Zeus" [label="similar",dir="both"];"tool=Zeus" -> "malpedia=Zeus" [label="similar",dir="both"];"banker=Zeus" [label="banker\nZeus",shape=box,style=filled,color=deepskyblue];"botnet=Zeus" [label="botnet\nZeus",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/0ce448de-c2bb-4c6e-9ad7-c4030f02b4d7.png b/static/graphs/0ce448de-c2bb-4c6e-9ad7-c4030f02b4d7.png new file mode 100644 index 0000000..ca5ca39 Binary files /dev/null and b/static/graphs/0ce448de-c2bb-4c6e-9ad7-c4030f02b4d7.png differ diff --git a/static/graphs/0ced8926-914e-4c78-bc93-356fb90dbd1f b/static/graphs/0ced8926-914e-4c78-bc93-356fb90dbd1f new file mode 100644 index 0000000..075217a --- /dev/null +++ b/static/graphs/0ced8926-914e-4c78-bc93-356fb90dbd1f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=HALFBAKED - S0151" [label="mitre-enterprise-attack-malware\nHALFBAKED - S0151",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=HALFBAKED - S0151" -> "tool=VB Flash" [label="similar",dir="both"];"mitre-enterprise-attack-malware=HALFBAKED - S0151" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];"tool=VB Flash" [label="tool\nVB Flash",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/0ced8926-914e-4c78-bc93-356fb90dbd1f.png b/static/graphs/0ced8926-914e-4c78-bc93-356fb90dbd1f.png new file mode 100644 index 0000000..f03b67e Binary files /dev/null and b/static/graphs/0ced8926-914e-4c78-bc93-356fb90dbd1f.png differ diff --git a/static/graphs/0cf21558-1217-4d36-9536-2919cfd44825 b/static/graphs/0cf21558-1217-4d36-9536-2919cfd44825 new file mode 100644 index 0000000..78bfab5 --- /dev/null +++ b/static/graphs/0cf21558-1217-4d36-9536-2919cfd44825 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Regin" [label="tool\nRegin",shape=box,style=filled,color=deepskyblue];"tool=Regin" -> "mitre-enterprise-attack-malware=Regin - S0019" [label="similar",dir="both"];"tool=Regin" -> "malpedia=Regin" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Regin - S0019" [label="mitre-enterprise-attack-malware\nRegin - S0019",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Regin - S0019" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/0cf21558-1217-4d36-9536-2919cfd44825.png b/static/graphs/0cf21558-1217-4d36-9536-2919cfd44825.png new file mode 100644 index 0000000..e09b2bf Binary files /dev/null and b/static/graphs/0cf21558-1217-4d36-9536-2919cfd44825.png differ diff --git a/static/graphs/0d58f329-1356-468c-88ab-e21fbb64c02b b/static/graphs/0d58f329-1356-468c-88ab-e21fbb64c02b new file mode 100644 index 0000000..9354372 --- /dev/null +++ b/static/graphs/0d58f329-1356-468c-88ab-e21fbb64c02b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Asprox" [label="botnet\nAsprox",shape=box,style=filled,color=deepskyblue];"botnet=Asprox" -> "malpedia=Asprox" [label="similar",dir="both"];} diff --git a/static/graphs/0d58f329-1356-468c-88ab-e21fbb64c02b.png b/static/graphs/0d58f329-1356-468c-88ab-e21fbb64c02b.png new file mode 100644 index 0000000..0ff395d Binary files /dev/null and b/static/graphs/0d58f329-1356-468c-88ab-e21fbb64c02b.png differ diff --git a/static/graphs/0da10682-85c6-4c0b-bace-ba1f7adfb63e b/static/graphs/0da10682-85c6-4c0b-bace-ba1f7adfb63e new file mode 100644 index 0000000..ccf94d5 --- /dev/null +++ b/static/graphs/0da10682-85c6-4c0b-bace-ba1f7adfb63e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Scarlet Mimic" [label="threat-actor\nScarlet Mimic",shape=octagon,style=filled,color=indianred1];"threat-actor=Scarlet Mimic" -> "mitre-enterprise-attack-intrusion-set=Scarlet Mimic - G0029" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Scarlet Mimic - G0029" [label="mitre-enterprise-attack-intrusion-set\nScarlet Mimic - G0029",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Scarlet Mimic - G0029" -> "mitre-enterprise-attack-malware=Psylo - S0078" [label="uses",];"mitre-enterprise-attack-malware=Psylo - S0078" [label="mitre-enterprise-attack-malware\nPsylo - S0078",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Psylo - S0078" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/0da10682-85c6-4c0b-bace-ba1f7adfb63e.png b/static/graphs/0da10682-85c6-4c0b-bace-ba1f7adfb63e.png new file mode 100644 index 0000000..d667f00 Binary files /dev/null and b/static/graphs/0da10682-85c6-4c0b-bace-ba1f7adfb63e.png differ diff --git a/static/graphs/0db09158-6e48-4e7c-8ce7-2b10b9c0c039 b/static/graphs/0db09158-6e48-4e7c-8ce7-2b10b9c0c039 new file mode 100644 index 0000000..b5d1ed4 --- /dev/null +++ b/static/graphs/0db09158-6e48-4e7c-8ce7-2b10b9c0c039 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Misdat - S0083" [label="mitre-enterprise-attack-malware\nMisdat - S0083",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Misdat - S0083" -> "malpedia=Misdat" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Misdat - S0083" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/0db09158-6e48-4e7c-8ce7-2b10b9c0c039.png b/static/graphs/0db09158-6e48-4e7c-8ce7-2b10b9c0c039.png new file mode 100644 index 0000000..1cacb99 Binary files /dev/null and b/static/graphs/0db09158-6e48-4e7c-8ce7-2b10b9c0c039.png differ diff --git a/static/graphs/0e18b800-906c-4e44-a143-b11c72b3448b b/static/graphs/0e18b800-906c-4e44-a143-b11c72b3448b new file mode 100644 index 0000000..260cb6c --- /dev/null +++ b/static/graphs/0e18b800-906c-4e44-a143-b11c72b3448b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=FLIPSIDE - S0173" [label="mitre-enterprise-attack-malware\nFLIPSIDE - S0173",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=FLIPSIDE - S0173" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/0e18b800-906c-4e44-a143-b11c72b3448b.png b/static/graphs/0e18b800-906c-4e44-a143-b11c72b3448b.png new file mode 100644 index 0000000..e8da50c Binary files /dev/null and b/static/graphs/0e18b800-906c-4e44-a143-b11c72b3448b.png differ diff --git a/static/graphs/0e5bdf42-a7f7-4d16-a074-4915bd262f80 b/static/graphs/0e5bdf42-a7f7-4d16-a074-4915bd262f80 new file mode 100644 index 0000000..03e82fe --- /dev/null +++ b/static/graphs/0e5bdf42-a7f7-4d16-a074-4915bd262f80 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Exfiltration Over Alternative Protocol Mitigation - T1048" [label="mitre-enterprise-attack-course-of-action\nExfiltration Over Alternative Protocol Mitigation - T1048",shape=ellipse];"mitre-enterprise-attack-course-of-action=Exfiltration Over Alternative Protocol Mitigation - T1048" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Alternative Protocol - T1048" [label="mitigates",];} diff --git a/static/graphs/0e5bdf42-a7f7-4d16-a074-4915bd262f80.png b/static/graphs/0e5bdf42-a7f7-4d16-a074-4915bd262f80.png new file mode 100644 index 0000000..fba5a06 Binary files /dev/null and b/static/graphs/0e5bdf42-a7f7-4d16-a074-4915bd262f80.png differ diff --git a/static/graphs/0ea72cd5-ca30-46ba-bc04-378f701c658f b/static/graphs/0ea72cd5-ca30-46ba-bc04-378f701c658f new file mode 100644 index 0000000..fa3564f --- /dev/null +++ b/static/graphs/0ea72cd5-ca30-46ba-bc04-378f701c658f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=GCMAN - G0036" [label="mitre-enterprise-attack-intrusion-set\nGCMAN - G0036",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=GCMAN - G0036" -> "threat-actor=GCMAN" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=GCMAN - G0036" -> "mitre-enterprise-attack-attack-pattern=Remote Services - T1021" [label="uses",];"threat-actor=GCMAN" [label="threat-actor\nGCMAN",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/0ea72cd5-ca30-46ba-bc04-378f701c658f.png b/static/graphs/0ea72cd5-ca30-46ba-bc04-378f701c658f.png new file mode 100644 index 0000000..45f7b20 Binary files /dev/null and b/static/graphs/0ea72cd5-ca30-46ba-bc04-378f701c658f.png differ diff --git a/static/graphs/0f1ad2ef-41d4-4b7a-9304-ddae68ea3005 b/static/graphs/0f1ad2ef-41d4-4b7a-9304-ddae68ea3005 new file mode 100644 index 0000000..cbf1628 --- /dev/null +++ b/static/graphs/0f1ad2ef-41d4-4b7a-9304-ddae68ea3005 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=adbupd - S0202" [label="mitre-enterprise-attack-malware\nadbupd - S0202",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=adbupd - S0202" -> "mitre-enterprise-attack-attack-pattern=Windows Management Instrumentation Event Subscription - T1084" [label="uses",];} diff --git a/static/graphs/0f1ad2ef-41d4-4b7a-9304-ddae68ea3005.png b/static/graphs/0f1ad2ef-41d4-4b7a-9304-ddae68ea3005.png new file mode 100644 index 0000000..9fa8fa3 Binary files /dev/null and b/static/graphs/0f1ad2ef-41d4-4b7a-9304-ddae68ea3005.png differ diff --git a/static/graphs/0f862b01-99da-47cc-9bdb-db4a86a95bb1 b/static/graphs/0f862b01-99da-47cc-9bdb-db4a86a95bb1 new file mode 100644 index 0000000..5d58cc2 --- /dev/null +++ b/static/graphs/0f862b01-99da-47cc-9bdb-db4a86a95bb1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Emissary - S0082" [label="mitre-enterprise-attack-malware\nEmissary - S0082",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Emissary - S0082" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/0f862b01-99da-47cc-9bdb-db4a86a95bb1.png b/static/graphs/0f862b01-99da-47cc-9bdb-db4a86a95bb1.png new file mode 100644 index 0000000..351e6ee Binary files /dev/null and b/static/graphs/0f862b01-99da-47cc-9bdb-db4a86a95bb1.png differ diff --git a/static/graphs/0f96a666-bf26-44e0-8ad6-f2136208c924 b/static/graphs/0f96a666-bf26-44e0-8ad6-f2136208c924 new file mode 100644 index 0000000..87ee769 --- /dev/null +++ b/static/graphs/0f96a666-bf26-44e0-8ad6-f2136208c924 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=IAP" [label="banker\nIAP",shape=box,style=filled,color=deepskyblue];"banker=IAP" -> "malpedia=ISFB" [label="similar",dir="both"];} diff --git a/static/graphs/0f96a666-bf26-44e0-8ad6-f2136208c924.png b/static/graphs/0f96a666-bf26-44e0-8ad6-f2136208c924.png new file mode 100644 index 0000000..3a88ca4 Binary files /dev/null and b/static/graphs/0f96a666-bf26-44e0-8ad6-f2136208c924.png differ diff --git a/static/graphs/1022138b-497c-40e6-b53a-13351cbd4090 b/static/graphs/1022138b-497c-40e6-b53a-13351cbd4090 new file mode 100644 index 0000000..6d94918 --- /dev/null +++ b/static/graphs/1022138b-497c-40e6-b53a-13351cbd4090 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=File System Permissions Weakness Mitigation - T1044" [label="mitre-enterprise-attack-course-of-action\nFile System Permissions Weakness Mitigation - T1044",shape=ellipse];"mitre-enterprise-attack-course-of-action=File System Permissions Weakness Mitigation - T1044" -> "mitre-enterprise-attack-attack-pattern=File System Permissions Weakness - T1044" [label="mitigates",];} diff --git a/static/graphs/1022138b-497c-40e6-b53a-13351cbd4090.png b/static/graphs/1022138b-497c-40e6-b53a-13351cbd4090.png new file mode 100644 index 0000000..fdffa74 Binary files /dev/null and b/static/graphs/1022138b-497c-40e6-b53a-13351cbd4090.png differ diff --git a/static/graphs/102c3898-85e0-43ee-ae28-62a0a3ed9507 b/static/graphs/102c3898-85e0-43ee-ae28-62a0a3ed9507 new file mode 100644 index 0000000..36820dc --- /dev/null +++ b/static/graphs/102c3898-85e0-43ee-ae28-62a0a3ed9507 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=UACMe - S0116" [label="mitre-enterprise-attack-tool\nUACMe - S0116",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=UACMe - S0116" -> "malpedia=UACMe" [label="similar",dir="both"];"mitre-enterprise-attack-tool=UACMe - S0116" -> "mitre-enterprise-attack-attack-pattern=Bypass User Account Control - T1088" [label="uses",];} diff --git a/static/graphs/102c3898-85e0-43ee-ae28-62a0a3ed9507.png b/static/graphs/102c3898-85e0-43ee-ae28-62a0a3ed9507.png new file mode 100644 index 0000000..09c17d9 Binary files /dev/null and b/static/graphs/102c3898-85e0-43ee-ae28-62a0a3ed9507.png differ diff --git a/static/graphs/103d72e6-7e0d-4b3a-9373-c38567305c33 b/static/graphs/103d72e6-7e0d-4b3a-9373-c38567305c33 new file mode 100644 index 0000000..049bb35 --- /dev/null +++ b/static/graphs/103d72e6-7e0d-4b3a-9373-c38567305c33 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Friend/Follow/Connect to targets of interest - PRE-T1121" [label="mitre-pre-attack-attack-pattern\nFriend/Follow/Connect to targets of interest - PRE-T1121",shape=ellipse];"mitre-pre-attack-attack-pattern=Friend/Follow/Connect to targets of interest - PRE-T1121" -> "mitre-pre-attack-attack-pattern=Friend/Follow/Connect to targets of interest - PRE-T1141" [label="related-to",];"mitre-pre-attack-attack-pattern=Friend/Follow/Connect to targets of interest - PRE-T1141" [label="mitre-pre-attack-attack-pattern\nFriend/Follow/Connect to targets of interest - PRE-T1141",shape=ellipse];"mitre-pre-attack-attack-pattern=Friend/Follow/Connect to targets of interest - PRE-T1141" -> "mitre-pre-attack-attack-pattern=Friend/Follow/Connect to targets of interest - PRE-T1121" [label="related-to",];} diff --git a/static/graphs/103d72e6-7e0d-4b3a-9373-c38567305c33.png b/static/graphs/103d72e6-7e0d-4b3a-9373-c38567305c33.png new file mode 100644 index 0000000..c77ad1c Binary files /dev/null and b/static/graphs/103d72e6-7e0d-4b3a-9373-c38567305c33.png differ diff --git a/static/graphs/103ebfd8-4280-4027-b61a-69bd9967ad6c b/static/graphs/103ebfd8-4280-4027-b61a-69bd9967ad6c new file mode 100644 index 0000000..2093ca5 --- /dev/null +++ b/static/graphs/103ebfd8-4280-4027-b61a-69bd9967ad6c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Codoso" [label="threat-actor\nCodoso",shape=octagon,style=filled,color=indianred1];"threat-actor=Codoso" -> "threat-actor=Shell Crew" [label="similar",dir="both"];"threat-actor=Codoso" -> "threat-actor=Hurricane Panda" [label="similar",dir="both"];"threat-actor=Codoso" -> "mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" [label="mitre-enterprise-attack-intrusion-set\nDeep Panda - G0009",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"threat-actor=Shell Crew" [label="threat-actor\nShell Crew",shape=octagon,style=filled,color=indianred1];"threat-actor=Hurricane Panda" [label="threat-actor\nHurricane Panda",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/103ebfd8-4280-4027-b61a-69bd9967ad6c.png b/static/graphs/103ebfd8-4280-4027-b61a-69bd9967ad6c.png new file mode 100644 index 0000000..7f07322 Binary files /dev/null and b/static/graphs/103ebfd8-4280-4027-b61a-69bd9967ad6c.png differ diff --git a/static/graphs/10571bf2-8073-4edf-a71c-23bad225532e b/static/graphs/10571bf2-8073-4edf-a71c-23bad225532e new file mode 100644 index 0000000..39c90ac --- /dev/null +++ b/static/graphs/10571bf2-8073-4edf-a71c-23bad225532e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=AppInit DLLs Mitigation - T1103" [label="mitre-enterprise-attack-course-of-action\nAppInit DLLs Mitigation - T1103",shape=ellipse];"mitre-enterprise-attack-course-of-action=AppInit DLLs Mitigation - T1103" -> "mitre-enterprise-attack-attack-pattern=AppInit DLLs - T1103" [label="mitigates",];} diff --git a/static/graphs/10571bf2-8073-4edf-a71c-23bad225532e.png b/static/graphs/10571bf2-8073-4edf-a71c-23bad225532e.png new file mode 100644 index 0000000..7987e33 Binary files /dev/null and b/static/graphs/10571bf2-8073-4edf-a71c-23bad225532e.png differ diff --git a/static/graphs/10f50ef8-6e3b-11e8-a648-d73fb4d2f48e b/static/graphs/10f50ef8-6e3b-11e8-a648-d73fb4d2f48e new file mode 100644 index 0000000..611a741 --- /dev/null +++ b/static/graphs/10f50ef8-6e3b-11e8-a648-d73fb4d2f48e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=InvisiMole" [label="tool\nInvisiMole",shape=box,style=filled,color=deepskyblue];"tool=InvisiMole" -> "malpedia=InvisiMole" [label="similar",dir="both"];} diff --git a/static/graphs/10f50ef8-6e3b-11e8-a648-d73fb4d2f48e.png b/static/graphs/10f50ef8-6e3b-11e8-a648-d73fb4d2f48e.png new file mode 100644 index 0000000..ead4c9d Binary files /dev/null and b/static/graphs/10f50ef8-6e3b-11e8-a648-d73fb4d2f48e.png differ diff --git a/static/graphs/10f92054-b028-11e8-a51f-2f82236ac72d b/static/graphs/10f92054-b028-11e8-a51f-2f82236ac72d new file mode 100644 index 0000000..53c4e9b --- /dev/null +++ b/static/graphs/10f92054-b028-11e8-a51f-2f82236ac72d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoNar" [label="ransomware\nCryptoNar",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoNar" -> "ransomware=CryptoJoker" [label="similar",dir="both"];"ransomware=CryptoJoker" [label="ransomware\nCryptoJoker",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/10f92054-b028-11e8-a51f-2f82236ac72d.png b/static/graphs/10f92054-b028-11e8-a51f-2f82236ac72d.png new file mode 100644 index 0000000..cf6d027 Binary files /dev/null and b/static/graphs/10f92054-b028-11e8-a51f-2f82236ac72d.png differ diff --git a/static/graphs/11bd699b-f2c2-4e48-bf46-fb3f8acd9799 b/static/graphs/11bd699b-f2c2-4e48-bf46-fb3f8acd9799 new file mode 100644 index 0000000..63d6147 --- /dev/null +++ b/static/graphs/11bd699b-f2c2-4e48-bf46-fb3f8acd9799 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Insecure Third-Party Libraries - MOB-T1028" [label="mitre-mobile-attack-attack-pattern\nInsecure Third-Party Libraries - MOB-T1028",shape=ellipse];} diff --git a/static/graphs/11bd699b-f2c2-4e48-bf46-fb3f8acd9799.png b/static/graphs/11bd699b-f2c2-4e48-bf46-fb3f8acd9799.png new file mode 100644 index 0000000..77038bd Binary files /dev/null and b/static/graphs/11bd699b-f2c2-4e48-bf46-fb3f8acd9799.png differ diff --git a/static/graphs/11e17436-6ede-4733-8547-4ce0254ea19e b/static/graphs/11e17436-6ede-4733-8547-4ce0254ea19e new file mode 100644 index 0000000..d5c31c6 --- /dev/null +++ b/static/graphs/11e17436-6ede-4733-8547-4ce0254ea19e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cutting Kitten" -> "mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="similar",dir="both"];"threat-actor=Cutting Kitten" -> "threat-actor=Cleaver" [label="similar",dir="both"];"threat-actor=Cutting Kitten" -> "threat-actor=OilRig" [label="similar",dir="both"];"threat-actor=Cutting Kitten" -> "threat-actor=Clever Kitten" [label="similar",dir="both"];"threat-actor=Cutting Kitten" -> "threat-actor=CHRYSENE" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Flying Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Charming Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Rocket Kitten" [label="similar",dir="both"];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "threat-actor=Greenbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="similar",dir="both"];"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/11e17436-6ede-4733-8547-4ce0254ea19e.png b/static/graphs/11e17436-6ede-4733-8547-4ce0254ea19e.png new file mode 100644 index 0000000..32f0e89 Binary files /dev/null and b/static/graphs/11e17436-6ede-4733-8547-4ce0254ea19e.png differ diff --git a/static/graphs/121b2863-5b97-4538-acb3-f8aae070ec13 b/static/graphs/121b2863-5b97-4538-acb3-f8aae070ec13 new file mode 100644 index 0000000..92b1b6e --- /dev/null +++ b/static/graphs/121b2863-5b97-4538-acb3-f8aae070ec13 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Launch Agent Mitigation - T1159" [label="mitre-enterprise-attack-course-of-action\nLaunch Agent Mitigation - T1159",shape=ellipse];"mitre-enterprise-attack-course-of-action=Launch Agent Mitigation - T1159" -> "mitre-enterprise-attack-attack-pattern=Launch Agent - T1159" [label="mitigates",];} diff --git a/static/graphs/121b2863-5b97-4538-acb3-f8aae070ec13.png b/static/graphs/121b2863-5b97-4538-acb3-f8aae070ec13.png new file mode 100644 index 0000000..6a394e2 Binary files /dev/null and b/static/graphs/121b2863-5b97-4538-acb3-f8aae070ec13.png differ diff --git a/static/graphs/123bd7b3-675c-4b1a-8482-c55782b20e2b b/static/graphs/123bd7b3-675c-4b1a-8482-c55782b20e2b new file mode 100644 index 0000000..067b6d1 --- /dev/null +++ b/static/graphs/123bd7b3-675c-4b1a-8482-c55782b20e2b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=BUBBLEWRAP - S0043" [label="mitre-enterprise-attack-malware\nBUBBLEWRAP - S0043",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BUBBLEWRAP - S0043" -> "mitre-enterprise-attack-attack-pattern=System Information Discovery - T1082" [label="uses",];} diff --git a/static/graphs/123bd7b3-675c-4b1a-8482-c55782b20e2b.png b/static/graphs/123bd7b3-675c-4b1a-8482-c55782b20e2b.png new file mode 100644 index 0000000..19f0605 Binary files /dev/null and b/static/graphs/123bd7b3-675c-4b1a-8482-c55782b20e2b.png differ diff --git a/static/graphs/12bb8f4f-af29-49a0-8c2c-d28468f28fd8 b/static/graphs/12bb8f4f-af29-49a0-8c2c-d28468f28fd8 new file mode 100644 index 0000000..1263b93 --- /dev/null +++ b/static/graphs/12bb8f4f-af29-49a0-8c2c-d28468f28fd8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=hcdLoader" [label="rat\nhcdLoader",shape=box,style=filled,color=deepskyblue];"rat=hcdLoader" -> "mitre-enterprise-attack-malware=hcdLoader - S0071" [label="similar",dir="both"];"mitre-enterprise-attack-malware=hcdLoader - S0071" [label="mitre-enterprise-attack-malware\nhcdLoader - S0071",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=hcdLoader - S0071" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/12bb8f4f-af29-49a0-8c2c-d28468f28fd8.png b/static/graphs/12bb8f4f-af29-49a0-8c2c-d28468f28fd8.png new file mode 100644 index 0000000..e5d602b Binary files /dev/null and b/static/graphs/12bb8f4f-af29-49a0-8c2c-d28468f28fd8.png differ diff --git a/static/graphs/12c13879-b7bd-4bc5-8def-aacec386d432 b/static/graphs/12c13879-b7bd-4bc5-8def-aacec386d432 new file mode 100644 index 0000000..e9a345b --- /dev/null +++ b/static/graphs/12c13879-b7bd-4bc5-8def-aacec386d432 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Regsvr32 Mitigation - T1117" [label="mitre-enterprise-attack-course-of-action\nRegsvr32 Mitigation - T1117",shape=ellipse];"mitre-enterprise-attack-course-of-action=Regsvr32 Mitigation - T1117" -> "mitre-enterprise-attack-attack-pattern=Regsvr32 - T1117" [label="mitigates",];} diff --git a/static/graphs/12c13879-b7bd-4bc5-8def-aacec386d432.png b/static/graphs/12c13879-b7bd-4bc5-8def-aacec386d432.png new file mode 100644 index 0000000..4eb2495 Binary files /dev/null and b/static/graphs/12c13879-b7bd-4bc5-8def-aacec386d432.png differ diff --git a/static/graphs/12cba7de-0a22-4a56-b51e-c514c67c3b43 b/static/graphs/12cba7de-0a22-4a56-b51e-c514c67c3b43 new file mode 100644 index 0000000..8e3a104 --- /dev/null +++ b/static/graphs/12cba7de-0a22-4a56-b51e-c514c67c3b43 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Hidden Users Mitigation - T1147" [label="mitre-enterprise-attack-course-of-action\nHidden Users Mitigation - T1147",shape=ellipse];"mitre-enterprise-attack-course-of-action=Hidden Users Mitigation - T1147" -> "mitre-enterprise-attack-attack-pattern=Hidden Users - T1147" [label="mitigates",];} diff --git a/static/graphs/12cba7de-0a22-4a56-b51e-c514c67c3b43.png b/static/graphs/12cba7de-0a22-4a56-b51e-c514c67c3b43.png new file mode 100644 index 0000000..599805b Binary files /dev/null and b/static/graphs/12cba7de-0a22-4a56-b51e-c514c67c3b43.png differ diff --git a/static/graphs/13cad982-35e3-4340-9095-7124b653df4b b/static/graphs/13cad982-35e3-4340-9095-7124b653df4b new file mode 100644 index 0000000..a595622 --- /dev/null +++ b/static/graphs/13cad982-35e3-4340-9095-7124b653df4b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Data from Information Repositories Mitigation - T1213" [label="mitre-enterprise-attack-course-of-action\nData from Information Repositories Mitigation - T1213",shape=ellipse];"mitre-enterprise-attack-course-of-action=Data from Information Repositories Mitigation - T1213" -> "mitre-enterprise-attack-attack-pattern=Data from Information Repositories - T1213" [label="mitigates",];} diff --git a/static/graphs/13cad982-35e3-4340-9095-7124b653df4b.png b/static/graphs/13cad982-35e3-4340-9095-7124b653df4b.png new file mode 100644 index 0000000..3e7a9f8 Binary files /dev/null and b/static/graphs/13cad982-35e3-4340-9095-7124b653df4b.png differ diff --git a/static/graphs/13cd9151-83b7-410d-9f98-25d0f0d1d80d b/static/graphs/13cd9151-83b7-410d-9f98-25d0f0d1d80d new file mode 100644 index 0000000..5cc003b --- /dev/null +++ b/static/graphs/13cd9151-83b7-410d-9f98-25d0f0d1d80d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=PowerSploit - S0194" [label="mitre-enterprise-attack-tool\nPowerSploit - S0194",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=PowerSploit - S0194" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];} diff --git a/static/graphs/13cd9151-83b7-410d-9f98-25d0f0d1d80d.png b/static/graphs/13cd9151-83b7-410d-9f98-25d0f0d1d80d.png new file mode 100644 index 0000000..e863c5d Binary files /dev/null and b/static/graphs/13cd9151-83b7-410d-9f98-25d0f0d1d80d.png differ diff --git a/static/graphs/1422b81c-a3c6-4229-8523-82d705400f46 b/static/graphs/1422b81c-a3c6-4229-8523-82d705400f46 new file mode 100644 index 0000000..ef62b91 --- /dev/null +++ b/static/graphs/1422b81c-a3c6-4229-8523-82d705400f46 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Sibot" [label="tool\nSibot",shape=box,style=filled,color=deepskyblue];"tool=Sibot" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"microsoft-activity-group=NOBELIUM" [label="microsoft-activity-group\nNOBELIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=NOBELIUM" -> "threat-actor=UNC2452" [label="similar",dir="both"];"microsoft-activity-group=NOBELIUM" -> "backdoor=SUNBURST" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=TEARDROP" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=GoldMax" [label="uses",];"backdoor=SUNBURST" [label="backdoor\nSUNBURST",shape=box,style=filled,color=deepskyblue];"backdoor=SUNBURST" -> "tool=SUNSPOT" [label="dropped-by",];"backdoor=SUNBURST" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"threat-actor=UNC2452" [label="threat-actor\nUNC2452",shape=octagon,style=filled,color=indianred1];"tool=TEARDROP" [label="tool\nTEARDROP",shape=box,style=filled,color=deepskyblue];"tool=TEARDROP" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=TEARDROP" -> "tool=Raindrop" [label="variant-of",];"tool=GoldMax" [label="tool\nGoldMax",shape=box,style=filled,color=deepskyblue];"tool=GoldMax" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=SUNSPOT" [label="tool\nSUNSPOT",shape=box,style=filled,color=deepskyblue];"tool=SUNSPOT" -> "backdoor=SUNBURST" [label="dropped",];"tool=Raindrop" [label="tool\nRaindrop",shape=box,style=filled,color=deepskyblue];"tool=Raindrop" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=Raindrop" -> "tool=TEARDROP" [label="variant-of",];} diff --git a/static/graphs/1422b81c-a3c6-4229-8523-82d705400f46.png b/static/graphs/1422b81c-a3c6-4229-8523-82d705400f46.png new file mode 100644 index 0000000..80c6f12 Binary files /dev/null and b/static/graphs/1422b81c-a3c6-4229-8523-82d705400f46.png differ diff --git a/static/graphs/14b63e6b-7531-4476-9e60-02cc5db48b62 b/static/graphs/14b63e6b-7531-4476-9e60-02cc5db48b62 new file mode 100644 index 0000000..f022419 --- /dev/null +++ b/static/graphs/14b63e6b-7531-4476-9e60-02cc5db48b62 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Exploitation of Remote Services Mitigation - T1210" [label="mitre-enterprise-attack-course-of-action\nExploitation of Remote Services Mitigation - T1210",shape=ellipse];"mitre-enterprise-attack-course-of-action=Exploitation of Remote Services Mitigation - T1210" -> "mitre-enterprise-attack-attack-pattern=Exploitation of Remote Services - T1210" [label="mitigates",];} diff --git a/static/graphs/14b63e6b-7531-4476-9e60-02cc5db48b62.png b/static/graphs/14b63e6b-7531-4476-9e60-02cc5db48b62.png new file mode 100644 index 0000000..2e5f915 Binary files /dev/null and b/static/graphs/14b63e6b-7531-4476-9e60-02cc5db48b62.png differ diff --git a/static/graphs/14f08f6f-7f58-48a8-8469-472244ffb571 b/static/graphs/14f08f6f-7f58-48a8-8469-472244ffb571 new file mode 100644 index 0000000..288bbe1 --- /dev/null +++ b/static/graphs/14f08f6f-7f58-48a8-8469-472244ffb571 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=MacDownloader" [label="tool\nMacDownloader",shape=box,style=filled,color=deepskyblue];"tool=MacDownloader" -> "malpedia=MacDownloader" [label="similar",dir="both"];} diff --git a/static/graphs/14f08f6f-7f58-48a8-8469-472244ffb571.png b/static/graphs/14f08f6f-7f58-48a8-8469-472244ffb571.png new file mode 100644 index 0000000..9fbc506 Binary files /dev/null and b/static/graphs/14f08f6f-7f58-48a8-8469-472244ffb571.png differ diff --git a/static/graphs/154e97b5-47ef-415a-99a6-2157f1b50339 b/static/graphs/154e97b5-47ef-415a-99a6-2157f1b50339 new file mode 100644 index 0000000..9cb7cf5 --- /dev/null +++ b/static/graphs/154e97b5-47ef-415a-99a6-2157f1b50339 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"microsoft-activity-group=PLATINUM" [label="microsoft-activity-group\nPLATINUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=PLATINUM" -> "mitre-enterprise-attack-intrusion-set=PLATINUM - G0068" [label="similar",dir="both"];"microsoft-activity-group=PLATINUM" -> "threat-actor=PLATINUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=PLATINUM - G0068" [label="mitre-enterprise-attack-intrusion-set\nPLATINUM - G0068",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=PLATINUM - G0068" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];"threat-actor=PLATINUM" [label="threat-actor\nPLATINUM",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/154e97b5-47ef-415a-99a6-2157f1b50339.png b/static/graphs/154e97b5-47ef-415a-99a6-2157f1b50339.png new file mode 100644 index 0000000..5c73595 Binary files /dev/null and b/static/graphs/154e97b5-47ef-415a-99a6-2157f1b50339.png differ diff --git a/static/graphs/1553b156-6767-47f7-9eb4-2a692505666d b/static/graphs/1553b156-6767-47f7-9eb4-2a692505666d new file mode 100644 index 0000000..0705320 --- /dev/null +++ b/static/graphs/1553b156-6767-47f7-9eb4-2a692505666d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=Application Vetting - MOB-M1005" [label="mitre-mobile-attack-course-of-action\nApplication Vetting - MOB-M1005",shape=ellipse];"mitre-mobile-attack-course-of-action=Application Vetting - MOB-M1005" -> "mitre-mobile-attack-attack-pattern=Obfuscated or Encrypted Payload - MOB-T1009" [label="mitigates",];"mitre-mobile-attack-course-of-action=Application Vetting - MOB-M1005" -> "mitre-mobile-attack-attack-pattern=Access Call Log - MOB-T1036" [label="mitigates",];} diff --git a/static/graphs/1553b156-6767-47f7-9eb4-2a692505666d.png b/static/graphs/1553b156-6767-47f7-9eb4-2a692505666d.png new file mode 100644 index 0000000..9c7ff34 Binary files /dev/null and b/static/graphs/1553b156-6767-47f7-9eb4-2a692505666d.png differ diff --git a/static/graphs/15bd72f9-5ebc-4fef-8fbf-32c2d848f076 b/static/graphs/15bd72f9-5ebc-4fef-8fbf-32c2d848f076 new file mode 100644 index 0000000..705f3fa --- /dev/null +++ b/static/graphs/15bd72f9-5ebc-4fef-8fbf-32c2d848f076 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Abusive Content:(Child) Sexual Exploitation/Sexual/Violent Content" [label="rsit\nAbusive Content:(Child) Sexual Exploitation/Sexual/Violent Content",shape=ellipse];} diff --git a/static/graphs/15bd72f9-5ebc-4fef-8fbf-32c2d848f076.png b/static/graphs/15bd72f9-5ebc-4fef-8fbf-32c2d848f076.png new file mode 100644 index 0000000..e25f9d9 Binary files /dev/null and b/static/graphs/15bd72f9-5ebc-4fef-8fbf-32c2d848f076.png differ diff --git a/static/graphs/15e969e6-f031-4441-a49b-f401332e4b00 b/static/graphs/15e969e6-f031-4441-a49b-f401332e4b00 new file mode 100644 index 0000000..3c50b58 --- /dev/null +++ b/static/graphs/15e969e6-f031-4441-a49b-f401332e4b00 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Dyre" [label="banker\nDyre",shape=box,style=filled,color=deepskyblue];"banker=Dyre" -> "mitre-enterprise-attack-malware=Dyre - S0024" [label="similar",dir="both"];"banker=Dyre" -> "malpedia=Dyre" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Dyre - S0024" [label="mitre-enterprise-attack-malware\nDyre - S0024",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Dyre - S0024" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="uses",];} diff --git a/static/graphs/15e969e6-f031-4441-a49b-f401332e4b00.png b/static/graphs/15e969e6-f031-4441-a49b-f401332e4b00.png new file mode 100644 index 0000000..1e753d8 Binary files /dev/null and b/static/graphs/15e969e6-f031-4441-a49b-f401332e4b00.png differ diff --git a/static/graphs/160af6af-e733-4b6a-a04a-71c620ac0930 b/static/graphs/160af6af-e733-4b6a-a04a-71c620ac0930 new file mode 100644 index 0000000..6d01b27 --- /dev/null +++ b/static/graphs/160af6af-e733-4b6a-a04a-71c620ac0930 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Third-party Software Mitigation - T1072" [label="mitre-enterprise-attack-course-of-action\nThird-party Software Mitigation - T1072",shape=ellipse];"mitre-enterprise-attack-course-of-action=Third-party Software Mitigation - T1072" -> "mitre-enterprise-attack-attack-pattern=Third-party Software - T1072" [label="mitigates",];} diff --git a/static/graphs/160af6af-e733-4b6a-a04a-71c620ac0930.png b/static/graphs/160af6af-e733-4b6a-a04a-71c620ac0930.png new file mode 100644 index 0000000..430cc22 Binary files /dev/null and b/static/graphs/160af6af-e733-4b6a-a04a-71c620ac0930.png differ diff --git a/static/graphs/166c0eca-02fd-424a-92c0-6b5106994d31 b/static/graphs/166c0eca-02fd-424a-92c0-6b5106994d31 new file mode 100644 index 0000000..87ad8e9 --- /dev/null +++ b/static/graphs/166c0eca-02fd-424a-92c0-6b5106994d31 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=ZLib - S0086" [label="mitre-enterprise-attack-malware\nZLib - S0086",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ZLib - S0086" -> "mitre-enterprise-attack-attack-pattern=System Service Discovery - T1007" [label="uses",];} diff --git a/static/graphs/166c0eca-02fd-424a-92c0-6b5106994d31.png b/static/graphs/166c0eca-02fd-424a-92c0-6b5106994d31.png new file mode 100644 index 0000000..14227e4 Binary files /dev/null and b/static/graphs/166c0eca-02fd-424a-92c0-6b5106994d31.png differ diff --git a/static/graphs/16902832-0118-40f2-b29e-eaba799b2bf4 b/static/graphs/16902832-0118-40f2-b29e-eaba799b2bf4 new file mode 100644 index 0000000..633214c --- /dev/null +++ b/static/graphs/16902832-0118-40f2-b29e-eaba799b2bf4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"backdoor=SUNBURST" [label="backdoor\nSUNBURST",shape=box,style=filled,color=deepskyblue];"backdoor=SUNBURST" -> "tool=SUNSPOT" [label="dropped-by",];"backdoor=SUNBURST" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"microsoft-activity-group=NOBELIUM" [label="microsoft-activity-group\nNOBELIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=NOBELIUM" -> "threat-actor=UNC2452" [label="similar",dir="both"];"microsoft-activity-group=NOBELIUM" -> "backdoor=SUNBURST" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=TEARDROP" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=GoldMax" [label="uses",];"tool=SUNSPOT" [label="tool\nSUNSPOT",shape=box,style=filled,color=deepskyblue];"tool=SUNSPOT" -> "backdoor=SUNBURST" [label="dropped",];"threat-actor=UNC2452" [label="threat-actor\nUNC2452",shape=octagon,style=filled,color=indianred1];"tool=TEARDROP" [label="tool\nTEARDROP",shape=box,style=filled,color=deepskyblue];"tool=TEARDROP" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=TEARDROP" -> "tool=Raindrop" [label="variant-of",];"tool=GoldMax" [label="tool\nGoldMax",shape=box,style=filled,color=deepskyblue];"tool=GoldMax" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=Raindrop" [label="tool\nRaindrop",shape=box,style=filled,color=deepskyblue];"tool=Raindrop" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=Raindrop" -> "tool=TEARDROP" [label="variant-of",];} diff --git a/static/graphs/16902832-0118-40f2-b29e-eaba799b2bf4.png b/static/graphs/16902832-0118-40f2-b29e-eaba799b2bf4.png new file mode 100644 index 0000000..7a84a22 Binary files /dev/null and b/static/graphs/16902832-0118-40f2-b29e-eaba799b2bf4.png differ diff --git a/static/graphs/16a8ac85-a06f-460f-ad22-910167bd7332 b/static/graphs/16a8ac85-a06f-460f-ad22-910167bd7332 new file mode 100644 index 0000000..602ce90 --- /dev/null +++ b/static/graphs/16a8ac85-a06f-460f-ad22-910167bd7332 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Binary Padding Mitigation - T1009" [label="mitre-enterprise-attack-course-of-action\nBinary Padding Mitigation - T1009",shape=ellipse];"mitre-enterprise-attack-course-of-action=Binary Padding Mitigation - T1009" -> "mitre-enterprise-attack-attack-pattern=Binary Padding - T1009" [label="mitigates",];} diff --git a/static/graphs/16a8ac85-a06f-460f-ad22-910167bd7332.png b/static/graphs/16a8ac85-a06f-460f-ad22-910167bd7332.png new file mode 100644 index 0000000..2b4d817 Binary files /dev/null and b/static/graphs/16a8ac85-a06f-460f-ad22-910167bd7332.png differ diff --git a/static/graphs/16ade1aa-0ea1-4bb7-88cc-9079df2ae756 b/static/graphs/16ade1aa-0ea1-4bb7-88cc-9079df2ae756 new file mode 100644 index 0000000..4b2592c --- /dev/null +++ b/static/graphs/16ade1aa-0ea1-4bb7-88cc-9079df2ae756 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=admin@338 - G0018" [label="mitre-enterprise-attack-intrusion-set\nadmin@338 - G0018",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=admin@338 - G0018" -> "threat-actor=Temper Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=admin@338 - G0018" -> "mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="uses",];"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "rat=PoisonIvy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "tool=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "tool=poisonivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"threat-actor=Temper Panda" [label="threat-actor\nTemper Panda",shape=octagon,style=filled,color=indianred1];"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];} diff --git a/static/graphs/16ade1aa-0ea1-4bb7-88cc-9079df2ae756.png b/static/graphs/16ade1aa-0ea1-4bb7-88cc-9079df2ae756.png new file mode 100644 index 0000000..e4116b5 Binary files /dev/null and b/static/graphs/16ade1aa-0ea1-4bb7-88cc-9079df2ae756.png differ diff --git a/static/graphs/16dd03c6-0dfb-4d77-89cd-9ff3ee6e533d b/static/graphs/16dd03c6-0dfb-4d77-89cd-9ff3ee6e533d new file mode 100644 index 0000000..86a5656 --- /dev/null +++ b/static/graphs/16dd03c6-0dfb-4d77-89cd-9ff3ee6e533d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Audio Capture Mitigation - T1123" [label="mitre-enterprise-attack-course-of-action\nAudio Capture Mitigation - T1123",shape=ellipse];"mitre-enterprise-attack-course-of-action=Audio Capture Mitigation - T1123" -> "mitre-enterprise-attack-attack-pattern=Audio Capture - T1123" [label="mitigates",];} diff --git a/static/graphs/16dd03c6-0dfb-4d77-89cd-9ff3ee6e533d.png b/static/graphs/16dd03c6-0dfb-4d77-89cd-9ff3ee6e533d.png new file mode 100644 index 0000000..c5fe699 Binary files /dev/null and b/static/graphs/16dd03c6-0dfb-4d77-89cd-9ff3ee6e533d.png differ diff --git a/static/graphs/16f144e4-c780-4ed2-98b4-55d14e2dfa44 b/static/graphs/16f144e4-c780-4ed2-98b4-55d14e2dfa44 new file mode 100644 index 0000000..ce924d8 --- /dev/null +++ b/static/graphs/16f144e4-c780-4ed2-98b4-55d14e2dfa44 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=System Owner/User Discovery Mitigation - T1033" [label="mitre-enterprise-attack-course-of-action\nSystem Owner/User Discovery Mitigation - T1033",shape=ellipse];"mitre-enterprise-attack-course-of-action=System Owner/User Discovery Mitigation - T1033" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="mitigates",];} diff --git a/static/graphs/16f144e4-c780-4ed2-98b4-55d14e2dfa44.png b/static/graphs/16f144e4-c780-4ed2-98b4-55d14e2dfa44.png new file mode 100644 index 0000000..519d0b1 Binary files /dev/null and b/static/graphs/16f144e4-c780-4ed2-98b4-55d14e2dfa44.png differ diff --git a/static/graphs/170db76b-93f7-4fd1-97fc-55937c079b66 b/static/graphs/170db76b-93f7-4fd1-97fc-55937c079b66 new file mode 100644 index 0000000..60becd9 --- /dev/null +++ b/static/graphs/170db76b-93f7-4fd1-97fc-55937c079b66 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Trojan.Naid" [label="tool\nTrojan.Naid",shape=box,style=filled,color=deepskyblue];"tool=Trojan.Naid" -> "mitre-enterprise-attack-malware=Naid - S0205" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Naid - S0205" [label="mitre-enterprise-attack-malware\nNaid - S0205",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Naid - S0205" -> "mitre-enterprise-attack-attack-pattern=Modify Registry - T1112" [label="uses",];} diff --git a/static/graphs/170db76b-93f7-4fd1-97fc-55937c079b66.png b/static/graphs/170db76b-93f7-4fd1-97fc-55937c079b66.png new file mode 100644 index 0000000..883cd2c Binary files /dev/null and b/static/graphs/170db76b-93f7-4fd1-97fc-55937c079b66.png differ diff --git a/static/graphs/175ebcc0-d74f-49b2-9226-c660ca1fe2e8 b/static/graphs/175ebcc0-d74f-49b2-9226-c660ca1fe2e8 new file mode 100644 index 0000000..81203cb --- /dev/null +++ b/static/graphs/175ebcc0-d74f-49b2-9226-c660ca1fe2e8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Free-Freedom" [label="ransomware\nFree-Freedom",shape=box,style=filled,color=deepskyblue];"ransomware=Free-Freedom" -> "ransomware=Roga" [label="similar",dir="both"];"ransomware=Roga" [label="ransomware\nRoga",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/175ebcc0-d74f-49b2-9226-c660ca1fe2e8.png b/static/graphs/175ebcc0-d74f-49b2-9226-c660ca1fe2e8.png new file mode 100644 index 0000000..af13063 Binary files /dev/null and b/static/graphs/175ebcc0-d74f-49b2-9226-c660ca1fe2e8.png differ diff --git a/static/graphs/17862c7d-9e60-48a0-b48e-da4dc4c3f6b0 b/static/graphs/17862c7d-9e60-48a0-b48e-da4dc4c3f6b0 new file mode 100644 index 0000000..6745e63 --- /dev/null +++ b/static/graphs/17862c7d-9e60-48a0-b48e-da4dc4c3f6b0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Patchwork - G0040" [label="mitre-enterprise-attack-intrusion-set\nPatchwork - G0040",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Patchwork - G0040" -> "mitre-enterprise-attack-intrusion-set=MONSOON - G0042" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Patchwork - G0040" -> "threat-actor=Dropping Elephant" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Patchwork - G0040" -> "mitre-enterprise-attack-attack-pattern=Data Encoding - T1132" [label="uses",];"mitre-enterprise-attack-intrusion-set=MONSOON - G0042" [label="mitre-enterprise-attack-intrusion-set\nMONSOON - G0042",shape=octagon,style=filled,color=indianred1];"threat-actor=Dropping Elephant" [label="threat-actor\nDropping Elephant",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/17862c7d-9e60-48a0-b48e-da4dc4c3f6b0.png b/static/graphs/17862c7d-9e60-48a0-b48e-da4dc4c3f6b0.png new file mode 100644 index 0000000..0fd4001 Binary files /dev/null and b/static/graphs/17862c7d-9e60-48a0-b48e-da4dc4c3f6b0.png differ diff --git a/static/graphs/179288c9-4ff1-4a7e-b728-35dd2e6aac43 b/static/graphs/179288c9-4ff1-4a7e-b728-35dd2e6aac43 new file mode 100644 index 0000000..b4bb7db --- /dev/null +++ b/static/graphs/179288c9-4ff1-4a7e-b728-35dd2e6aac43 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Qarallax" [label="rat\nQarallax",shape=box,style=filled,color=deepskyblue];"rat=Qarallax" -> "tool=qrat" [label="similar",dir="both"];"tool=qrat" [label="tool\nqrat",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/179288c9-4ff1-4a7e-b728-35dd2e6aac43.png b/static/graphs/179288c9-4ff1-4a7e-b728-35dd2e6aac43.png new file mode 100644 index 0000000..cd99f06 Binary files /dev/null and b/static/graphs/179288c9-4ff1-4a7e-b728-35dd2e6aac43.png differ diff --git a/static/graphs/17b40f60-729f-4fe8-8aea-cc9ee44a95d5 b/static/graphs/17b40f60-729f-4fe8-8aea-cc9ee44a95d5 new file mode 100644 index 0000000..8669482 --- /dev/null +++ b/static/graphs/17b40f60-729f-4fe8-8aea-cc9ee44a95d5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=RedLeaves - S0153" [label="mitre-enterprise-attack-malware\nRedLeaves - S0153",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RedLeaves - S0153" -> "rat=RedLeaves" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RedLeaves - S0153" -> "tool=BUGJUICE" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RedLeaves - S0153" -> "malpedia=RedLeaves" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RedLeaves - S0153" -> "mitre-enterprise-attack-attack-pattern=System Network Connections Discovery - T1049" [label="uses",];"rat=RedLeaves" [label="rat\nRedLeaves",shape=box,style=filled,color=deepskyblue];"tool=BUGJUICE" [label="tool\nBUGJUICE",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/17b40f60-729f-4fe8-8aea-cc9ee44a95d5.png b/static/graphs/17b40f60-729f-4fe8-8aea-cc9ee44a95d5.png new file mode 100644 index 0000000..4c015a7 Binary files /dev/null and b/static/graphs/17b40f60-729f-4fe8-8aea-cc9ee44a95d5.png differ diff --git a/static/graphs/17dec760-9c8f-4f1b-9b4b-0ac47a453234 b/static/graphs/17dec760-9c8f-4f1b-9b4b-0ac47a453234 new file mode 100644 index 0000000..f2ed3a9 --- /dev/null +++ b/static/graphs/17dec760-9c8f-4f1b-9b4b-0ac47a453234 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Miner-C - S0133" [label="mitre-enterprise-attack-malware\nMiner-C - S0133",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Miner-C - S0133" -> "mitre-enterprise-attack-attack-pattern=Taint Shared Content - T1080" [label="uses",];} diff --git a/static/graphs/17dec760-9c8f-4f1b-9b4b-0ac47a453234.png b/static/graphs/17dec760-9c8f-4f1b-9b4b-0ac47a453234.png new file mode 100644 index 0000000..739016d Binary files /dev/null and b/static/graphs/17dec760-9c8f-4f1b-9b4b-0ac47a453234.png differ diff --git a/static/graphs/17e919aa-4a49-445c-b103-dbb8df9e7351 b/static/graphs/17e919aa-4a49-445c-b103-dbb8df9e7351 new file mode 100644 index 0000000..9ed14b7 --- /dev/null +++ b/static/graphs/17e919aa-4a49-445c-b103-dbb8df9e7351 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=POWERSOURCE - S0145" [label="mitre-enterprise-attack-malware\nPOWERSOURCE - S0145",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=POWERSOURCE - S0145" -> "rat=DNSMessenger" [label="similar",dir="both"];"mitre-enterprise-attack-malware=POWERSOURCE - S0145" -> "mitre-enterprise-attack-malware=TEXTMATE - S0146" [label="similar",dir="both"];"mitre-enterprise-attack-malware=POWERSOURCE - S0145" -> "malpedia=DNSMessenger" [label="similar",dir="both"];"mitre-enterprise-attack-malware=POWERSOURCE - S0145" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"mitre-enterprise-attack-malware=TEXTMATE - S0146" [label="mitre-enterprise-attack-malware\nTEXTMATE - S0146",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TEXTMATE - S0146" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"rat=DNSMessenger" [label="rat\nDNSMessenger",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/17e919aa-4a49-445c-b103-dbb8df9e7351.png b/static/graphs/17e919aa-4a49-445c-b103-dbb8df9e7351.png new file mode 100644 index 0000000..bb6420d Binary files /dev/null and b/static/graphs/17e919aa-4a49-445c-b103-dbb8df9e7351.png differ diff --git a/static/graphs/1881da33-fdf2-4eea-afd0-e04caf9c000f b/static/graphs/1881da33-fdf2-4eea-afd0-e04caf9c000f new file mode 100644 index 0000000..3ab68b5 --- /dev/null +++ b/static/graphs/1881da33-fdf2-4eea-afd0-e04caf9c000f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Peripheral Device Discovery Mitigation - T1120" [label="mitre-enterprise-attack-course-of-action\nPeripheral Device Discovery Mitigation - T1120",shape=ellipse];"mitre-enterprise-attack-course-of-action=Peripheral Device Discovery Mitigation - T1120" -> "mitre-enterprise-attack-attack-pattern=Peripheral Device Discovery - T1120" [label="mitigates",];} diff --git a/static/graphs/1881da33-fdf2-4eea-afd0-e04caf9c000f.png b/static/graphs/1881da33-fdf2-4eea-afd0-e04caf9c000f.png new file mode 100644 index 0000000..b344c40 Binary files /dev/null and b/static/graphs/1881da33-fdf2-4eea-afd0-e04caf9c000f.png differ diff --git a/static/graphs/18d473a5-831b-47a5-97a1-a32156299825 b/static/graphs/18d473a5-831b-47a5-97a1-a32156299825 new file mode 100644 index 0000000..de24df0 --- /dev/null +++ b/static/graphs/18d473a5-831b-47a5-97a1-a32156299825 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Dropping Elephant" [label="threat-actor\nDropping Elephant",shape=octagon,style=filled,color=indianred1];"threat-actor=Dropping Elephant" -> "mitre-enterprise-attack-intrusion-set=Patchwork - G0040" [label="similar",dir="both"];"threat-actor=Dropping Elephant" -> "mitre-enterprise-attack-intrusion-set=MONSOON - G0042" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Patchwork - G0040" [label="mitre-enterprise-attack-intrusion-set\nPatchwork - G0040",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Patchwork - G0040" -> "mitre-enterprise-attack-attack-pattern=Data Encoding - T1132" [label="uses",];"mitre-enterprise-attack-intrusion-set=MONSOON - G0042" [label="mitre-enterprise-attack-intrusion-set\nMONSOON - G0042",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/18d473a5-831b-47a5-97a1-a32156299825.png b/static/graphs/18d473a5-831b-47a5-97a1-a32156299825.png new file mode 100644 index 0000000..cdfee01 Binary files /dev/null and b/static/graphs/18d473a5-831b-47a5-97a1-a32156299825.png differ diff --git a/static/graphs/1903ed75-05f7-4019-b0b7-7a8f23f22194 b/static/graphs/1903ed75-05f7-4019-b0b7-7a8f23f22194 new file mode 100644 index 0000000..b7269b8 --- /dev/null +++ b/static/graphs/1903ed75-05f7-4019-b0b7-7a8f23f22194 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoBit" [label="ransomware\nCryptoBit",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoBit" -> "ransomware=Mobef" [label="similar",dir="both"];"ransomware=Mobef" [label="ransomware\nMobef",shape=box,style=filled,color=deepskyblue];"ransomware=Mobef" -> "ransomware=Mobef-JustFun" [label="similar",dir="both"];"ransomware=Mobef-JustFun" [label="ransomware\nMobef-JustFun",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/1903ed75-05f7-4019-b0b7-7a8f23f22194.png b/static/graphs/1903ed75-05f7-4019-b0b7-7a8f23f22194.png new file mode 100644 index 0000000..8a83aad Binary files /dev/null and b/static/graphs/1903ed75-05f7-4019-b0b7-7a8f23f22194.png differ diff --git a/static/graphs/190edf95-9cd9-4e4a-a228-b716d52a751b b/static/graphs/190edf95-9cd9-4e4a-a228-b716d52a751b new file mode 100644 index 0000000..2f52b13 --- /dev/null +++ b/static/graphs/190edf95-9cd9-4e4a-a228-b716d52a751b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Cerber" [label="ransomware\nCerber",shape=box,style=filled,color=deepskyblue];"ransomware=Cerber" -> "malpedia=Cerber" [label="similar",dir="both"];} diff --git a/static/graphs/190edf95-9cd9-4e4a-a228-b716d52a751b.png b/static/graphs/190edf95-9cd9-4e4a-a228-b716d52a751b.png new file mode 100644 index 0000000..d7af67d Binary files /dev/null and b/static/graphs/190edf95-9cd9-4e4a-a228-b716d52a751b.png differ diff --git a/static/graphs/196f1f32-e0c2-4d46-99cd-234d4b6befe1 b/static/graphs/196f1f32-e0c2-4d46-99cd-234d4b6befe1 new file mode 100644 index 0000000..df9311a --- /dev/null +++ b/static/graphs/196f1f32-e0c2-4d46-99cd-234d4b6befe1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Felismus - S0171" [label="mitre-enterprise-attack-malware\nFelismus - S0171",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Felismus - S0171" -> "malpedia=Felismus" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Felismus - S0171" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/196f1f32-e0c2-4d46-99cd-234d4b6befe1.png b/static/graphs/196f1f32-e0c2-4d46-99cd-234d4b6befe1.png new file mode 100644 index 0000000..3f41417 Binary files /dev/null and b/static/graphs/196f1f32-e0c2-4d46-99cd-234d4b6befe1.png differ diff --git a/static/graphs/1974ea65-7312-4d91-a592-649983b46554 b/static/graphs/1974ea65-7312-4d91-a592-649983b46554 new file mode 100644 index 0000000..fdee1ba --- /dev/null +++ b/static/graphs/1974ea65-7312-4d91-a592-649983b46554 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Caterpillar WebShell" [label="tool\nCaterpillar WebShell",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/1974ea65-7312-4d91-a592-649983b46554.png b/static/graphs/1974ea65-7312-4d91-a592-649983b46554.png new file mode 100644 index 0000000..d47790e Binary files /dev/null and b/static/graphs/1974ea65-7312-4d91-a592-649983b46554.png differ diff --git a/static/graphs/199463de-d9be-46d6-bb41-07234c1dd5a6 b/static/graphs/199463de-d9be-46d6-bb41-07234c1dd5a6 new file mode 100644 index 0000000..dd7a2dd --- /dev/null +++ b/static/graphs/199463de-d9be-46d6-bb41-07234c1dd5a6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=GeminiDuke - S0049" [label="mitre-enterprise-attack-malware\nGeminiDuke - S0049",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=GeminiDuke - S0049" -> "tool=GeminiDuke" [label="similar",dir="both"];"mitre-enterprise-attack-malware=GeminiDuke - S0049" -> "mitre-enterprise-attack-attack-pattern=Account Discovery - T1087" [label="uses",];"tool=GeminiDuke" [label="tool\nGeminiDuke",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/199463de-d9be-46d6-bb41-07234c1dd5a6.png b/static/graphs/199463de-d9be-46d6-bb41-07234c1dd5a6.png new file mode 100644 index 0000000..33f7ebc Binary files /dev/null and b/static/graphs/199463de-d9be-46d6-bb41-07234c1dd5a6.png differ diff --git a/static/graphs/19edfa02-1a5f-47e4-ad82-3288f57f64cf b/static/graphs/19edfa02-1a5f-47e4-ad82-3288f57f64cf new file mode 100644 index 0000000..4981d73 --- /dev/null +++ b/static/graphs/19edfa02-1a5f-47e4-ad82-3288f57f64cf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Clipboard Data Mitigation - T1115" [label="mitre-enterprise-attack-course-of-action\nClipboard Data Mitigation - T1115",shape=ellipse];"mitre-enterprise-attack-course-of-action=Clipboard Data Mitigation - T1115" -> "mitre-enterprise-attack-attack-pattern=Clipboard Data - T1115" [label="mitigates",];} diff --git a/static/graphs/19edfa02-1a5f-47e4-ad82-3288f57f64cf.png b/static/graphs/19edfa02-1a5f-47e4-ad82-3288f57f64cf.png new file mode 100644 index 0000000..09d6c97 Binary files /dev/null and b/static/graphs/19edfa02-1a5f-47e4-ad82-3288f57f64cf.png differ diff --git a/static/graphs/1a295f87-af63-4d94-b130-039d6221fb11 b/static/graphs/1a295f87-af63-4d94-b130-039d6221fb11 new file mode 100644 index 0000000..15461d8 --- /dev/null +++ b/static/graphs/1a295f87-af63-4d94-b130-039d6221fb11 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party software services - PRE-T1085" [label="mitre-pre-attack-attack-pattern\nAcquire and/or use 3rd party software services - PRE-T1085",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party software services - PRE-T1085" -> "mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party software services - PRE-T1107" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party software services - PRE-T1107" [label="mitre-pre-attack-attack-pattern\nAcquire and/or use 3rd party software services - PRE-T1107",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party software services - PRE-T1107" -> "mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party software services - PRE-T1085" [label="related-to",];} diff --git a/static/graphs/1a295f87-af63-4d94-b130-039d6221fb11.png b/static/graphs/1a295f87-af63-4d94-b130-039d6221fb11.png new file mode 100644 index 0000000..d8475ed Binary files /dev/null and b/static/graphs/1a295f87-af63-4d94-b130-039d6221fb11.png differ diff --git a/static/graphs/1a77e156-76bc-43f5-bdd7-bd67f30fbbbb b/static/graphs/1a77e156-76bc-43f5-bdd7-bd67f30fbbbb new file mode 100644 index 0000000..aecf43a --- /dev/null +++ b/static/graphs/1a77e156-76bc-43f5-bdd7-bd67f30fbbbb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Gamaredon Group" [label="threat-actor\nGamaredon Group",shape=octagon,style=filled,color=indianred1];"threat-actor=Gamaredon Group" -> "mitre-enterprise-attack-intrusion-set=Gamaredon Group - G0047" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Gamaredon Group - G0047" [label="mitre-enterprise-attack-intrusion-set\nGamaredon Group - G0047",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Gamaredon Group - G0047" -> "mitre-enterprise-attack-attack-pattern=Scripting - T1064" [label="uses",];} diff --git a/static/graphs/1a77e156-76bc-43f5-bdd7-bd67f30fbbbb.png b/static/graphs/1a77e156-76bc-43f5-bdd7-bd67f30fbbbb.png new file mode 100644 index 0000000..c5db82d Binary files /dev/null and b/static/graphs/1a77e156-76bc-43f5-bdd7-bd67f30fbbbb.png differ diff --git a/static/graphs/1a7f5bd3-f6ee-4bd7-b949-2f3632ad6158 b/static/graphs/1a7f5bd3-f6ee-4bd7-b949-2f3632ad6158 new file mode 100644 index 0000000..e116a48 --- /dev/null +++ b/static/graphs/1a7f5bd3-f6ee-4bd7-b949-2f3632ad6158 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Gatekeeper Bypass Mitigation - T1144" [label="mitre-enterprise-attack-course-of-action\nGatekeeper Bypass Mitigation - T1144",shape=ellipse];"mitre-enterprise-attack-course-of-action=Gatekeeper Bypass Mitigation - T1144" -> "mitre-enterprise-attack-attack-pattern=Gatekeeper Bypass - T1144" [label="mitigates",];} diff --git a/static/graphs/1a7f5bd3-f6ee-4bd7-b949-2f3632ad6158.png b/static/graphs/1a7f5bd3-f6ee-4bd7-b949-2f3632ad6158.png new file mode 100644 index 0000000..33d44e3 Binary files /dev/null and b/static/graphs/1a7f5bd3-f6ee-4bd7-b949-2f3632ad6158.png differ diff --git a/static/graphs/1ad4697b-3388-48ed-8621-85abebf5dbbf b/static/graphs/1ad4697b-3388-48ed-8621-85abebf5dbbf new file mode 100644 index 0000000..1267df5 --- /dev/null +++ b/static/graphs/1ad4697b-3388-48ed-8621-85abebf5dbbf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Satori" [label="tool\nSatori",shape=box,style=filled,color=deepskyblue];"tool=Satori" -> "botnet=Satori" [label="similar",dir="both"];"tool=Satori" -> "malpedia=Satori" [label="similar",dir="both"];"botnet=Satori" [label="botnet\nSatori",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/1ad4697b-3388-48ed-8621-85abebf5dbbf.png b/static/graphs/1ad4697b-3388-48ed-8621-85abebf5dbbf.png new file mode 100644 index 0000000..6236e6d Binary files /dev/null and b/static/graphs/1ad4697b-3388-48ed-8621-85abebf5dbbf.png differ diff --git a/static/graphs/1b1ae63f-bcee-4aba-8994-6c60cee5e16f b/static/graphs/1b1ae63f-bcee-4aba-8994-6c60cee5e16f new file mode 100644 index 0000000..270f577 --- /dev/null +++ b/static/graphs/1b1ae63f-bcee-4aba-8994-6c60cee5e16f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=gh0st" [label="tool\ngh0st",shape=box,style=filled,color=deepskyblue];"tool=gh0st" -> "mitre-enterprise-attack-malware=gh0st - S0032" [label="similar",dir="both"];"mitre-enterprise-attack-malware=gh0st - S0032" [label="mitre-enterprise-attack-malware\ngh0st - S0032",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=gh0st - S0032" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];} diff --git a/static/graphs/1b1ae63f-bcee-4aba-8994-6c60cee5e16f.png b/static/graphs/1b1ae63f-bcee-4aba-8994-6c60cee5e16f.png new file mode 100644 index 0000000..8c9fe5d Binary files /dev/null and b/static/graphs/1b1ae63f-bcee-4aba-8994-6c60cee5e16f.png differ diff --git a/static/graphs/1b591586-e1ef-4a32-8dae-791aca5ddf41 b/static/graphs/1b591586-e1ef-4a32-8dae-791aca5ddf41 new file mode 100644 index 0000000..7ebcafe --- /dev/null +++ b/static/graphs/1b591586-e1ef-4a32-8dae-791aca5ddf41 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=TinyTyphon" [label="tool\nTinyTyphon",shape=box,style=filled,color=deepskyblue];"tool=TinyTyphon" -> "malpedia=TinyTyphon" [label="similar",dir="both"];} diff --git a/static/graphs/1b591586-e1ef-4a32-8dae-791aca5ddf41.png b/static/graphs/1b591586-e1ef-4a32-8dae-791aca5ddf41.png new file mode 100644 index 0000000..9b1fa79 Binary files /dev/null and b/static/graphs/1b591586-e1ef-4a32-8dae-791aca5ddf41.png differ diff --git a/static/graphs/1b63293f-13f0-4c25-9bf6-6ebc023fc8ff b/static/graphs/1b63293f-13f0-4c25-9bf6-6ebc023fc8ff new file mode 100644 index 0000000..f8e6f6f --- /dev/null +++ b/static/graphs/1b63293f-13f0-4c25-9bf6-6ebc023fc8ff @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Stuxnet" [label="tool\nStuxnet",shape=box,style=filled,color=deepskyblue];"tool=Stuxnet" -> "malpedia=Stuxnet" [label="similar",dir="both"];} diff --git a/static/graphs/1b63293f-13f0-4c25-9bf6-6ebc023fc8ff.png b/static/graphs/1b63293f-13f0-4c25-9bf6-6ebc023fc8ff.png new file mode 100644 index 0000000..eb8476e Binary files /dev/null and b/static/graphs/1b63293f-13f0-4c25-9bf6-6ebc023fc8ff.png differ diff --git a/static/graphs/1c0711c8-2a73-48a1-893d-ff88bcd23824 b/static/graphs/1c0711c8-2a73-48a1-893d-ff88bcd23824 new file mode 100644 index 0000000..f954e0a --- /dev/null +++ b/static/graphs/1c0711c8-2a73-48a1-893d-ff88bcd23824 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Scheduled Transfer Mitigation - T1029" [label="mitre-enterprise-attack-course-of-action\nScheduled Transfer Mitigation - T1029",shape=ellipse];"mitre-enterprise-attack-course-of-action=Scheduled Transfer Mitigation - T1029" -> "mitre-enterprise-attack-attack-pattern=Scheduled Transfer - T1029" [label="mitigates",];} diff --git a/static/graphs/1c0711c8-2a73-48a1-893d-ff88bcd23824.png b/static/graphs/1c0711c8-2a73-48a1-893d-ff88bcd23824.png new file mode 100644 index 0000000..8ebf6e3 Binary files /dev/null and b/static/graphs/1c0711c8-2a73-48a1-893d-ff88bcd23824.png differ diff --git a/static/graphs/1c0b39f9-a0c5-42b2-abd8-dc8f1eb74e67 b/static/graphs/1c0b39f9-a0c5-42b2-abd8-dc8f1eb74e67 new file mode 100644 index 0000000..17fd043 --- /dev/null +++ b/static/graphs/1c0b39f9-a0c5-42b2-abd8-dc8f1eb74e67 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Browser Bookmark Discovery Mitigation - T1217" [label="mitre-enterprise-attack-course-of-action\nBrowser Bookmark Discovery Mitigation - T1217",shape=ellipse];"mitre-enterprise-attack-course-of-action=Browser Bookmark Discovery Mitigation - T1217" -> "mitre-enterprise-attack-attack-pattern=Browser Bookmark Discovery - T1217" [label="mitigates",];} diff --git a/static/graphs/1c0b39f9-a0c5-42b2-abd8-dc8f1eb74e67.png b/static/graphs/1c0b39f9-a0c5-42b2-abd8-dc8f1eb74e67.png new file mode 100644 index 0000000..1df147a Binary files /dev/null and b/static/graphs/1c0b39f9-a0c5-42b2-abd8-dc8f1eb74e67.png differ diff --git a/static/graphs/1c63d4ec-0a75-4daa-b1df-0d11af3d3cc1 b/static/graphs/1c63d4ec-0a75-4daa-b1df-0d11af3d3cc1 new file mode 100644 index 0000000..a753093 --- /dev/null +++ b/static/graphs/1c63d4ec-0a75-4daa-b1df-0d11af3d3cc1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Dragonfly - G0035" [label="mitre-enterprise-attack-intrusion-set\nDragonfly - G0035",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Dragonfly - G0035" -> "threat-actor=Energetic Bear" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Dragonfly - G0035" -> "mitre-enterprise-attack-malware=Trojan.Karagany - S0094" [label="uses",];"mitre-enterprise-attack-malware=Trojan.Karagany - S0094" [label="mitre-enterprise-attack-malware\nTrojan.Karagany - S0094",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Trojan.Karagany - S0094" -> "mitre-enterprise-attack-attack-pattern=Software Packing - T1045" [label="uses",];"threat-actor=Energetic Bear" [label="threat-actor\nEnergetic Bear",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/1c63d4ec-0a75-4daa-b1df-0d11af3d3cc1.png b/static/graphs/1c63d4ec-0a75-4daa-b1df-0d11af3d3cc1.png new file mode 100644 index 0000000..7d89633 Binary files /dev/null and b/static/graphs/1c63d4ec-0a75-4daa-b1df-0d11af3d3cc1.png differ diff --git a/static/graphs/1c6bc7f3-d517-4971-aed4-8f939090846b b/static/graphs/1c6bc7f3-d517-4971-aed4-8f939090846b new file mode 100644 index 0000000..577e34a --- /dev/null +++ b/static/graphs/1c6bc7f3-d517-4971-aed4-8f939090846b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Port Monitors Mitigation - T1013" [label="mitre-enterprise-attack-course-of-action\nPort Monitors Mitigation - T1013",shape=ellipse];"mitre-enterprise-attack-course-of-action=Port Monitors Mitigation - T1013" -> "mitre-enterprise-attack-attack-pattern=Port Monitors - T1013" [label="mitigates",];} diff --git a/static/graphs/1c6bc7f3-d517-4971-aed4-8f939090846b.png b/static/graphs/1c6bc7f3-d517-4971-aed4-8f939090846b.png new file mode 100644 index 0000000..0397e6f Binary files /dev/null and b/static/graphs/1c6bc7f3-d517-4971-aed4-8f939090846b.png differ diff --git a/static/graphs/1ca3b039-404e-4132-88c2-4e41235cd2f5 b/static/graphs/1ca3b039-404e-4132-88c2-4e41235cd2f5 new file mode 100644 index 0000000..7c8e3c7 --- /dev/null +++ b/static/graphs/1ca3b039-404e-4132-88c2-4e41235cd2f5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Sowbug" [label="threat-actor\nSowbug",shape=octagon,style=filled,color=indianred1];"threat-actor=Sowbug" -> "mitre-enterprise-attack-intrusion-set=Sowbug - G0054" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Sowbug - G0054" [label="mitre-enterprise-attack-intrusion-set\nSowbug - G0054",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Sowbug - G0054" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];} diff --git a/static/graphs/1ca3b039-404e-4132-88c2-4e41235cd2f5.png b/static/graphs/1ca3b039-404e-4132-88c2-4e41235cd2f5.png new file mode 100644 index 0000000..462ef0a Binary files /dev/null and b/static/graphs/1ca3b039-404e-4132-88c2-4e41235cd2f5.png differ diff --git a/static/graphs/1cb7e1cc-d695-42b1-92f4-fd0112a3c9be b/static/graphs/1cb7e1cc-d695-42b1-92f4-fd0112a3c9be new file mode 100644 index 0000000..1bbf2fd --- /dev/null +++ b/static/graphs/1cb7e1cc-d695-42b1-92f4-fd0112a3c9be @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Comment Crew" [label="threat-actor\nComment Crew",shape=octagon,style=filled,color=indianred1];"threat-actor=Comment Crew" -> "mitre-pre-attack-intrusion-set=APT1 - G0006" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT1 - G0006" [label="mitre-enterprise-attack-intrusion-set\nAPT1 - G0006",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT1 - G0006" [label="mitre-pre-attack-intrusion-set\nAPT1 - G0006",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT1 - G0006" -> "mitre-enterprise-attack-attack-pattern=Email Collection - T1114" [label="uses",];"mitre-pre-attack-intrusion-set=APT1 - G0006" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];"mitre-pre-attack-intrusion-set=APT1 - G0006" -> "mitre-enterprise-attack-attack-pattern=Account Discovery - T1087" [label="uses",];} diff --git a/static/graphs/1cb7e1cc-d695-42b1-92f4-fd0112a3c9be.png b/static/graphs/1cb7e1cc-d695-42b1-92f4-fd0112a3c9be.png new file mode 100644 index 0000000..278b314 Binary files /dev/null and b/static/graphs/1cb7e1cc-d695-42b1-92f4-fd0112a3c9be.png differ diff --git a/static/graphs/1cc8963b-5ad4-4e19-8e9a-57b0ff1ef926 b/static/graphs/1cc8963b-5ad4-4e19-8e9a-57b0ff1ef926 new file mode 100644 index 0000000..447f430 --- /dev/null +++ b/static/graphs/1cc8963b-5ad4-4e19-8e9a-57b0ff1ef926 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=JadeRAT" [label="rat\nJadeRAT",shape=box,style=filled,color=deepskyblue];"rat=JadeRAT" -> "malpedia=JadeRAT" [label="similar",dir="both"];} diff --git a/static/graphs/1cc8963b-5ad4-4e19-8e9a-57b0ff1ef926.png b/static/graphs/1cc8963b-5ad4-4e19-8e9a-57b0ff1ef926.png new file mode 100644 index 0000000..e4c26ce Binary files /dev/null and b/static/graphs/1cc8963b-5ad4-4e19-8e9a-57b0ff1ef926.png differ diff --git a/static/graphs/1cc934e4-b01d-4543-a011-b988dfc1a458 b/static/graphs/1cc934e4-b01d-4543-a011-b988dfc1a458 new file mode 100644 index 0000000..ef672ae --- /dev/null +++ b/static/graphs/1cc934e4-b01d-4543-a011-b988dfc1a458 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Matroyshka - S0167" [label="mitre-enterprise-attack-malware\nMatroyshka - S0167",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Matroyshka - S0167" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];} diff --git a/static/graphs/1cc934e4-b01d-4543-a011-b988dfc1a458.png b/static/graphs/1cc934e4-b01d-4543-a011-b988dfc1a458.png new file mode 100644 index 0000000..223d465 Binary files /dev/null and b/static/graphs/1cc934e4-b01d-4543-a011-b988dfc1a458.png differ diff --git a/static/graphs/1d46f816-d159-4457-b98e-c34307d90655 b/static/graphs/1d46f816-d159-4457-b98e-c34307d90655 new file mode 100644 index 0000000..9bcab5a --- /dev/null +++ b/static/graphs/1d46f816-d159-4457-b98e-c34307d90655 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Ordinypt" [label="tool\nOrdinypt",shape=box,style=filled,color=deepskyblue];"tool=Ordinypt" -> "malpedia=Ordinypt" [label="similar",dir="both"];} diff --git a/static/graphs/1d46f816-d159-4457-b98e-c34307d90655.png b/static/graphs/1d46f816-d159-4457-b98e-c34307d90655.png new file mode 100644 index 0000000..fabc767 Binary files /dev/null and b/static/graphs/1d46f816-d159-4457-b98e-c34307d90655.png differ diff --git a/static/graphs/1d4a5704-c6fb-4bbb-92b2-88dc67f86339 b/static/graphs/1d4a5704-c6fb-4bbb-92b2-88dc67f86339 new file mode 100644 index 0000000..852d95d --- /dev/null +++ b/static/graphs/1d4a5704-c6fb-4bbb-92b2-88dc67f86339 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Ice IX" [label="banker\nIce IX",shape=box,style=filled,color=deepskyblue];"banker=Ice IX" -> "malpedia=Ice IX" [label="similar",dir="both"];} diff --git a/static/graphs/1d4a5704-c6fb-4bbb-92b2-88dc67f86339.png b/static/graphs/1d4a5704-c6fb-4bbb-92b2-88dc67f86339.png new file mode 100644 index 0000000..9925623 Binary files /dev/null and b/static/graphs/1d4a5704-c6fb-4bbb-92b2-88dc67f86339.png differ diff --git a/static/graphs/1d734fcc-58a2-4176-bfa9-0d96f447799d b/static/graphs/1d734fcc-58a2-4176-bfa9-0d96f447799d new file mode 100644 index 0000000..2beca8e --- /dev/null +++ b/static/graphs/1d734fcc-58a2-4176-bfa9-0d96f447799d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=ConfuserEx" [label="tool\nConfuserEx",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/1d734fcc-58a2-4176-bfa9-0d96f447799d.png b/static/graphs/1d734fcc-58a2-4176-bfa9-0d96f447799d.png new file mode 100644 index 0000000..ab5a58c Binary files /dev/null and b/static/graphs/1d734fcc-58a2-4176-bfa9-0d96f447799d.png differ diff --git a/static/graphs/1d808f62-cf63-4063-9727-ff6132514c22 b/static/graphs/1d808f62-cf63-4063-9727-ff6132514c22 new file mode 100644 index 0000000..245c252 --- /dev/null +++ b/static/graphs/1d808f62-cf63-4063-9727-ff6132514c22 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=WEBC2 - S0109" [label="mitre-enterprise-attack-malware\nWEBC2 - S0109",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=WEBC2 - S0109" -> "tool=WEBC2" [label="similar",dir="both"];"mitre-enterprise-attack-malware=WEBC2 - S0109" -> "mitre-enterprise-attack-attack-pattern=DLL Search Order Hijacking - T1038" [label="uses",];"tool=WEBC2" [label="tool\nWEBC2",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/1d808f62-cf63-4063-9727-ff6132514c22.png b/static/graphs/1d808f62-cf63-4063-9727-ff6132514c22.png new file mode 100644 index 0000000..42a3cdd Binary files /dev/null and b/static/graphs/1d808f62-cf63-4063-9727-ff6132514c22.png differ diff --git a/static/graphs/1d9fbf33-faea-40c1-b543-c7b39561f0ff b/static/graphs/1d9fbf33-faea-40c1-b543-c7b39561f0ff new file mode 100644 index 0000000..9d47e8a --- /dev/null +++ b/static/graphs/1d9fbf33-faea-40c1-b543-c7b39561f0ff @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Cardinal RAT" [label="tool\nCardinal RAT",shape=box,style=filled,color=deepskyblue];"tool=Cardinal RAT" -> "tool=EVILNUM" [label="similar",dir="both"];"tool=EVILNUM" [label="tool\nEVILNUM",shape=box,style=filled,color=deepskyblue];"tool=EVILNUM" -> "rat=Cardinal" [label="similar",dir="both"];"rat=Cardinal" [label="rat\nCardinal",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/1d9fbf33-faea-40c1-b543-c7b39561f0ff.png b/static/graphs/1d9fbf33-faea-40c1-b543-c7b39561f0ff.png new file mode 100644 index 0000000..83c151b Binary files /dev/null and b/static/graphs/1d9fbf33-faea-40c1-b543-c7b39561f0ff.png differ diff --git a/static/graphs/1de47f51-1f20-403b-a2e1-5eaabe275faa b/static/graphs/1de47f51-1f20-403b-a2e1-5eaabe275faa new file mode 100644 index 0000000..0414424 --- /dev/null +++ b/static/graphs/1de47f51-1f20-403b-a2e1-5eaabe275faa @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=SOURFACE" [label="tool\nSOURFACE",shape=box,style=filled,color=deepskyblue];"tool=SOURFACE" -> "mitre-enterprise-attack-malware=CORESHELL - S0137" [label="similar",dir="both"];"tool=SOURFACE" -> "tool=CORESHELL" [label="similar",dir="both"];"tool=SOURFACE" -> "android=Sofacy" [label="similar",dir="both"];"tool=SOURFACE" -> "mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="similar",dir="both"];"tool=SOURFACE" -> "tool=GAMEFISH" [label="similar",dir="both"];"tool=SOURFACE" -> "mitre-enterprise-attack-malware=Komplex - S0162" [label="similar",dir="both"];"tool=SOURFACE" -> "malpedia=Komplex" [label="similar",dir="both"];"tool=SOURFACE" -> "malpedia=Seduploader" [label="similar",dir="both"];"android=Sofacy" [label="android\nSofacy",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" [label="mitre-enterprise-attack-malware\nKomplex - S0162",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"mitre-enterprise-attack-malware=CORESHELL - S0137" [label="mitre-enterprise-attack-malware\nCORESHELL - S0137",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CORESHELL - S0137" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="mitre-enterprise-attack-malware\nJHUHUGIT - S0044",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Privilege Escalation - T1068" [label="uses",];"tool=GAMEFISH" [label="tool\nGAMEFISH",shape=box,style=filled,color=deepskyblue];"tool=CORESHELL" [label="tool\nCORESHELL",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/1de47f51-1f20-403b-a2e1-5eaabe275faa.png b/static/graphs/1de47f51-1f20-403b-a2e1-5eaabe275faa.png new file mode 100644 index 0000000..9876b89 Binary files /dev/null and b/static/graphs/1de47f51-1f20-403b-a2e1-5eaabe275faa.png differ diff --git a/static/graphs/1df62d96-88f8-473c-94a2-252eb360ba62 b/static/graphs/1df62d96-88f8-473c-94a2-252eb360ba62 new file mode 100644 index 0000000..316161c --- /dev/null +++ b/static/graphs/1df62d96-88f8-473c-94a2-252eb360ba62 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=jRAT" [label="rat\njRAT",shape=box,style=filled,color=deepskyblue];"rat=jRAT" -> "malpedia=jRAT" [label="similar",dir="both"];} diff --git a/static/graphs/1df62d96-88f8-473c-94a2-252eb360ba62.png b/static/graphs/1df62d96-88f8-473c-94a2-252eb360ba62.png new file mode 100644 index 0000000..2aae41d Binary files /dev/null and b/static/graphs/1df62d96-88f8-473c-94a2-252eb360ba62.png differ diff --git a/static/graphs/1e19dae5-80c3-4358-abcd-2bf0ba4c76fe b/static/graphs/1e19dae5-80c3-4358-abcd-2bf0ba4c76fe new file mode 100644 index 0000000..35aa4a9 --- /dev/null +++ b/static/graphs/1e19dae5-80c3-4358-abcd-2bf0ba4c76fe @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=LockerGoga" [label="ransomware\nLockerGoga",shape=box,style=filled,color=deepskyblue];"ransomware=LockerGoga" -> "ransomware=Nodera Ransomware" [label="similar",dir="both"];} diff --git a/static/graphs/1e19dae5-80c3-4358-abcd-2bf0ba4c76fe.png b/static/graphs/1e19dae5-80c3-4358-abcd-2bf0ba4c76fe.png new file mode 100644 index 0000000..0e36b46 Binary files /dev/null and b/static/graphs/1e19dae5-80c3-4358-abcd-2bf0ba4c76fe.png differ diff --git a/static/graphs/1e25d254-3f03-4752-b8d6-023a23e7d4ae b/static/graphs/1e25d254-3f03-4752-b8d6-023a23e7d4ae new file mode 100644 index 0000000..b0d51c8 --- /dev/null +++ b/static/graphs/1e25d254-3f03-4752-b8d6-023a23e7d4ae @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Fanny" [label="tool\nFanny",shape=box,style=filled,color=deepskyblue];"tool=Fanny" -> "malpedia=Fanny" [label="similar",dir="both"];} diff --git a/static/graphs/1e25d254-3f03-4752-b8d6-023a23e7d4ae.png b/static/graphs/1e25d254-3f03-4752-b8d6-023a23e7d4ae.png new file mode 100644 index 0000000..f63e003 Binary files /dev/null and b/static/graphs/1e25d254-3f03-4752-b8d6-023a23e7d4ae.png differ diff --git a/static/graphs/1e3384ae-4b48-4c96-b7c2-bc1cc1eda203 b/static/graphs/1e3384ae-4b48-4c96-b7c2-bc1cc1eda203 new file mode 100644 index 0000000..58c0d2d --- /dev/null +++ b/static/graphs/1e3384ae-4b48-4c96-b7c2-bc1cc1eda203 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Jigsaw" [label="ransomware\nJigsaw",shape=box,style=filled,color=deepskyblue];"ransomware=Jigsaw" -> "malpedia=Jigsaw" [label="similar",dir="both"];} diff --git a/static/graphs/1e3384ae-4b48-4c96-b7c2-bc1cc1eda203.png b/static/graphs/1e3384ae-4b48-4c96-b7c2-bc1cc1eda203.png new file mode 100644 index 0000000..034a6e2 Binary files /dev/null and b/static/graphs/1e3384ae-4b48-4c96-b7c2-bc1cc1eda203.png differ diff --git a/static/graphs/1e4ef2c7-ee96-4484-9baa-3b5777561301 b/static/graphs/1e4ef2c7-ee96-4484-9baa-3b5777561301 new file mode 100644 index 0000000..170820c --- /dev/null +++ b/static/graphs/1e4ef2c7-ee96-4484-9baa-3b5777561301 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=AppleScript Mitigation - T1155" [label="mitre-enterprise-attack-course-of-action\nAppleScript Mitigation - T1155",shape=ellipse];"mitre-enterprise-attack-course-of-action=AppleScript Mitigation - T1155" -> "mitre-enterprise-attack-attack-pattern=AppleScript - T1155" [label="mitigates",];} diff --git a/static/graphs/1e4ef2c7-ee96-4484-9baa-3b5777561301.png b/static/graphs/1e4ef2c7-ee96-4484-9baa-3b5777561301.png new file mode 100644 index 0000000..90ab28d Binary files /dev/null and b/static/graphs/1e4ef2c7-ee96-4484-9baa-3b5777561301.png differ diff --git a/static/graphs/1e614ba5-2fc5-4464-b512-2ceafb14d76d b/static/graphs/1e614ba5-2fc5-4464-b512-2ceafb14d76d new file mode 100644 index 0000000..0d79a82 --- /dev/null +++ b/static/graphs/1e614ba5-2fc5-4464-b512-2ceafb14d76d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Indirect Command Execution Mitigation - T1202" [label="mitre-enterprise-attack-course-of-action\nIndirect Command Execution Mitigation - T1202",shape=ellipse];"mitre-enterprise-attack-course-of-action=Indirect Command Execution Mitigation - T1202" -> "mitre-enterprise-attack-attack-pattern=Indirect Command Execution - T1202" [label="mitigates",];} diff --git a/static/graphs/1e614ba5-2fc5-4464-b512-2ceafb14d76d.png b/static/graphs/1e614ba5-2fc5-4464-b512-2ceafb14d76d.png new file mode 100644 index 0000000..cfe8748 Binary files /dev/null and b/static/graphs/1e614ba5-2fc5-4464-b512-2ceafb14d76d.png differ diff --git a/static/graphs/1e912590-c879-4a9c-81b9-2d31e82ac718 b/static/graphs/1e912590-c879-4a9c-81b9-2d31e82ac718 new file mode 100644 index 0000000..434e5b2 --- /dev/null +++ b/static/graphs/1e912590-c879-4a9c-81b9-2d31e82ac718 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=GoldMax" [label="tool\nGoldMax",shape=box,style=filled,color=deepskyblue];"tool=GoldMax" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"microsoft-activity-group=NOBELIUM" [label="microsoft-activity-group\nNOBELIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=NOBELIUM" -> "threat-actor=UNC2452" [label="similar",dir="both"];"microsoft-activity-group=NOBELIUM" -> "backdoor=SUNBURST" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=TEARDROP" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=GoldMax" [label="uses",];"backdoor=SUNBURST" [label="backdoor\nSUNBURST",shape=box,style=filled,color=deepskyblue];"backdoor=SUNBURST" -> "tool=SUNSPOT" [label="dropped-by",];"backdoor=SUNBURST" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"threat-actor=UNC2452" [label="threat-actor\nUNC2452",shape=octagon,style=filled,color=indianred1];"tool=TEARDROP" [label="tool\nTEARDROP",shape=box,style=filled,color=deepskyblue];"tool=TEARDROP" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=TEARDROP" -> "tool=Raindrop" [label="variant-of",];"tool=SUNSPOT" [label="tool\nSUNSPOT",shape=box,style=filled,color=deepskyblue];"tool=SUNSPOT" -> "backdoor=SUNBURST" [label="dropped",];"tool=Raindrop" [label="tool\nRaindrop",shape=box,style=filled,color=deepskyblue];"tool=Raindrop" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=Raindrop" -> "tool=TEARDROP" [label="variant-of",];} diff --git a/static/graphs/1e912590-c879-4a9c-81b9-2d31e82ac718.png b/static/graphs/1e912590-c879-4a9c-81b9-2d31e82ac718.png new file mode 100644 index 0000000..5245123 Binary files /dev/null and b/static/graphs/1e912590-c879-4a9c-81b9-2d31e82ac718.png differ diff --git a/static/graphs/1f05f646-5af6-4a95-825b-164f49616aa4 b/static/graphs/1f05f646-5af6-4a95-825b-164f49616aa4 new file mode 100644 index 0000000..1e40c92 --- /dev/null +++ b/static/graphs/1f05f646-5af6-4a95-825b-164f49616aa4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"exploit-kit=Fallout" [label="exploit-kit\nFallout",shape=box,style=filled,color=deepskyblue];"exploit-kit=Fallout" -> "ransomware=GandCrab" [label="dropped",];"ransomware=GandCrab" [label="ransomware\nGandCrab",shape=box,style=filled,color=deepskyblue];"ransomware=GandCrab" -> "exploit-kit=Fallout" [label="dropped-by",];} diff --git a/static/graphs/1f05f646-5af6-4a95-825b-164f49616aa4.png b/static/graphs/1f05f646-5af6-4a95-825b-164f49616aa4.png new file mode 100644 index 0000000..14c6e84 Binary files /dev/null and b/static/graphs/1f05f646-5af6-4a95-825b-164f49616aa4.png differ diff --git a/static/graphs/1f1be19e-d1b5-408b-90a0-03ad27cc8924 b/static/graphs/1f1be19e-d1b5-408b-90a0-03ad27cc8924 new file mode 100644 index 0000000..ff67ca9 --- /dev/null +++ b/static/graphs/1f1be19e-d1b5-408b-90a0-03ad27cc8924 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=PowerRatankba" [label="tool\nPowerRatankba",shape=box,style=filled,color=deepskyblue];"tool=PowerRatankba" -> "malpedia=PowerRatankba" [label="similar",dir="both"];} diff --git a/static/graphs/1f1be19e-d1b5-408b-90a0-03ad27cc8924.png b/static/graphs/1f1be19e-d1b5-408b-90a0-03ad27cc8924.png new file mode 100644 index 0000000..7826d41 Binary files /dev/null and b/static/graphs/1f1be19e-d1b5-408b-90a0-03ad27cc8924.png differ diff --git a/static/graphs/1f34230d-b6ae-4dc7-8599-78c18820bd21 b/static/graphs/1f34230d-b6ae-4dc7-8599-78c18820bd21 new file mode 100644 index 0000000..35b96e0 --- /dev/null +++ b/static/graphs/1f34230d-b6ae-4dc7-8599-78c18820bd21 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Network Share Discovery Mitigation - T1135" [label="mitre-enterprise-attack-course-of-action\nNetwork Share Discovery Mitigation - T1135",shape=ellipse];"mitre-enterprise-attack-course-of-action=Network Share Discovery Mitigation - T1135" -> "mitre-enterprise-attack-attack-pattern=Network Share Discovery - T1135" [label="mitigates",];} diff --git a/static/graphs/1f34230d-b6ae-4dc7-8599-78c18820bd21.png b/static/graphs/1f34230d-b6ae-4dc7-8599-78c18820bd21.png new file mode 100644 index 0000000..9385f8b Binary files /dev/null and b/static/graphs/1f34230d-b6ae-4dc7-8599-78c18820bd21.png differ diff --git a/static/graphs/1f96d624-8409-4472-ad8a-30618ee6b2e2 b/static/graphs/1f96d624-8409-4472-ad8a-30618ee6b2e2 new file mode 100644 index 0000000..5370789 --- /dev/null +++ b/static/graphs/1f96d624-8409-4472-ad8a-30618ee6b2e2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=App Delivered via Email Attachment - MOB-T1037" [label="mitre-mobile-attack-attack-pattern\nApp Delivered via Email Attachment - MOB-T1037",shape=ellipse];} diff --git a/static/graphs/1f96d624-8409-4472-ad8a-30618ee6b2e2.png b/static/graphs/1f96d624-8409-4472-ad8a-30618ee6b2e2.png new file mode 100644 index 0000000..7cf8cc9 Binary files /dev/null and b/static/graphs/1f96d624-8409-4472-ad8a-30618ee6b2e2.png differ diff --git a/static/graphs/1fc5671f-5757-43bf-8d6d-a9a93b03713a b/static/graphs/1fc5671f-5757-43bf-8d6d-a9a93b03713a new file mode 100644 index 0000000..3f069c0 --- /dev/null +++ b/static/graphs/1fc5671f-5757-43bf-8d6d-a9a93b03713a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=PLATINUM" [label="threat-actor\nPLATINUM",shape=octagon,style=filled,color=indianred1];"threat-actor=PLATINUM" -> "mitre-enterprise-attack-intrusion-set=PLATINUM - G0068" [label="similar",dir="both"];"threat-actor=PLATINUM" -> "microsoft-activity-group=PLATINUM" [label="similar",dir="both"];"microsoft-activity-group=PLATINUM" [label="microsoft-activity-group\nPLATINUM",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=PLATINUM - G0068" [label="mitre-enterprise-attack-intrusion-set\nPLATINUM - G0068",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=PLATINUM - G0068" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];} diff --git a/static/graphs/1fc5671f-5757-43bf-8d6d-a9a93b03713a.png b/static/graphs/1fc5671f-5757-43bf-8d6d-a9a93b03713a.png new file mode 100644 index 0000000..6ae330e Binary files /dev/null and b/static/graphs/1fc5671f-5757-43bf-8d6d-a9a93b03713a.png differ diff --git a/static/graphs/201e8794-a93b-476f-9436-1dd859c6e5d9 b/static/graphs/201e8794-a93b-476f-9436-1dd859c6e5d9 new file mode 100644 index 0000000..23889cb --- /dev/null +++ b/static/graphs/201e8794-a93b-476f-9436-1dd859c6e5d9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"backdoor=Speculoos" [label="backdoor\nSpeculoos",shape=box,style=filled,color=deepskyblue];"backdoor=Speculoos" -> "threat-actor=APT41" [label="used-by",];"threat-actor=APT41" [label="threat-actor\nAPT41",shape=octagon,style=filled,color=indianred1];"threat-actor=APT41" -> "backdoor=Speculoos" [label="uses",];} diff --git a/static/graphs/201e8794-a93b-476f-9436-1dd859c6e5d9.png b/static/graphs/201e8794-a93b-476f-9436-1dd859c6e5d9.png new file mode 100644 index 0000000..ba19bf7 Binary files /dev/null and b/static/graphs/201e8794-a93b-476f-9436-1dd859c6e5d9.png differ diff --git a/static/graphs/203fd529-6382-417e-a68f-7565fbf89ece b/static/graphs/203fd529-6382-417e-a68f-7565fbf89ece new file mode 100644 index 0000000..a2b8913 --- /dev/null +++ b/static/graphs/203fd529-6382-417e-a68f-7565fbf89ece @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=SHARPKNOT" [label="tool\nSHARPKNOT",shape=box,style=filled,color=deepskyblue];"tool=SHARPKNOT" -> "malpedia=SHARPKNOT" [label="similar",dir="both"];} diff --git a/static/graphs/203fd529-6382-417e-a68f-7565fbf89ece.png b/static/graphs/203fd529-6382-417e-a68f-7565fbf89ece.png new file mode 100644 index 0000000..58231e2 Binary files /dev/null and b/static/graphs/203fd529-6382-417e-a68f-7565fbf89ece.png differ diff --git a/static/graphs/2074b2ad-612e-4758-adce-7901c1b49bbc b/static/graphs/2074b2ad-612e-4758-adce-7901c1b49bbc new file mode 100644 index 0000000..1ec0a39 --- /dev/null +++ b/static/graphs/2074b2ad-612e-4758-adce-7901c1b49bbc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=OldBoot - MOB-S0001" [label="mitre-mobile-attack-malware\nOldBoot - MOB-S0001",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=OldBoot - MOB-S0001" -> "mitre-mobile-attack-attack-pattern=Modify OS Kernel or Boot Partition - MOB-T1001" [label="uses",];} diff --git a/static/graphs/2074b2ad-612e-4758-adce-7901c1b49bbc.png b/static/graphs/2074b2ad-612e-4758-adce-7901c1b49bbc.png new file mode 100644 index 0000000..fff9a6c Binary files /dev/null and b/static/graphs/2074b2ad-612e-4758-adce-7901c1b49bbc.png differ diff --git a/static/graphs/20a66013-8dab-4ca3-a67d-766c842c561c b/static/graphs/20a66013-8dab-4ca3-a67d-766c842c561c new file mode 100644 index 0000000..9c38a28 --- /dev/null +++ b/static/graphs/20a66013-8dab-4ca3-a67d-766c842c561c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Dynamic DNS - PRE-T1088" [label="mitre-pre-attack-attack-pattern\nDynamic DNS - PRE-T1088",shape=ellipse];"mitre-pre-attack-attack-pattern=Dynamic DNS - PRE-T1088" -> "mitre-pre-attack-attack-pattern=Dynamic DNS - PRE-T1110" [label="related-to",];"mitre-pre-attack-attack-pattern=Dynamic DNS - PRE-T1110" [label="mitre-pre-attack-attack-pattern\nDynamic DNS - PRE-T1110",shape=ellipse];"mitre-pre-attack-attack-pattern=Dynamic DNS - PRE-T1110" -> "mitre-pre-attack-attack-pattern=Dynamic DNS - PRE-T1088" [label="related-to",];} diff --git a/static/graphs/20a66013-8dab-4ca3-a67d-766c842c561c.png b/static/graphs/20a66013-8dab-4ca3-a67d-766c842c561c.png new file mode 100644 index 0000000..277211e Binary files /dev/null and b/static/graphs/20a66013-8dab-4ca3-a67d-766c842c561c.png differ diff --git a/static/graphs/20b848d1-3f21-403b-a4c8-c5d2a89faeb9 b/static/graphs/20b848d1-3f21-403b-a4c8-c5d2a89faeb9 new file mode 100644 index 0000000..ef68a6e --- /dev/null +++ b/static/graphs/20b848d1-3f21-403b-a4c8-c5d2a89faeb9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/20b848d1-3f21-403b-a4c8-c5d2a89faeb9.png b/static/graphs/20b848d1-3f21-403b-a4c8-c5d2a89faeb9.png new file mode 100644 index 0000000..67801e3 Binary files /dev/null and b/static/graphs/20b848d1-3f21-403b-a4c8-c5d2a89faeb9.png differ diff --git a/static/graphs/20d56cd6-8dff-4871-9889-d32d254816de b/static/graphs/20d56cd6-8dff-4871-9889-d32d254816de new file mode 100644 index 0000000..9bc6329 --- /dev/null +++ b/static/graphs/20d56cd6-8dff-4871-9889-d32d254816de @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=Gooligan - MOB-S0006" [label="mitre-mobile-attack-malware\nGooligan - MOB-S0006",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Gooligan - MOB-S0006" -> "mitre-mobile-attack-attack-pattern=Access Sensitive Data or Credentials in Files - MOB-T1012" [label="uses",];} diff --git a/static/graphs/20d56cd6-8dff-4871-9889-d32d254816de.png b/static/graphs/20d56cd6-8dff-4871-9889-d32d254816de.png new file mode 100644 index 0000000..28af4a7 Binary files /dev/null and b/static/graphs/20d56cd6-8dff-4871-9889-d32d254816de.png differ diff --git a/static/graphs/20dbaf05-59b8-4dc6-8777-0b17f4553a23 b/static/graphs/20dbaf05-59b8-4dc6-8777-0b17f4553a23 new file mode 100644 index 0000000..e142cf2 --- /dev/null +++ b/static/graphs/20dbaf05-59b8-4dc6-8777-0b17f4553a23 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=SpyNote RAT - MOB-S0021" [label="mitre-mobile-attack-malware\nSpyNote RAT - MOB-S0021",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=SpyNote RAT - MOB-S0021" -> "mitre-mobile-attack-attack-pattern=Capture SMS Messages - MOB-T1015" [label="uses",];"mitre-mobile-attack-malware=SpyNote RAT - MOB-S0021" -> "mitre-mobile-attack-attack-pattern=Location Tracking - MOB-T1033" [label="uses",];} diff --git a/static/graphs/20dbaf05-59b8-4dc6-8777-0b17f4553a23.png b/static/graphs/20dbaf05-59b8-4dc6-8777-0b17f4553a23.png new file mode 100644 index 0000000..a150d13 Binary files /dev/null and b/static/graphs/20dbaf05-59b8-4dc6-8777-0b17f4553a23.png differ diff --git a/static/graphs/211cfe9f-2676-4e1c-a5f5-2c8091da2a68 b/static/graphs/211cfe9f-2676-4e1c-a5f5-2c8091da2a68 new file mode 100644 index 0000000..0ea3fbc --- /dev/null +++ b/static/graphs/211cfe9f-2676-4e1c-a5f5-2c8091da2a68 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=HAPPYWORK - S0214" [label="mitre-enterprise-attack-malware\nHAPPYWORK - S0214",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=HAPPYWORK - S0214" -> "tool=HAPPYWORK" [label="similar",dir="both"];"mitre-enterprise-attack-malware=HAPPYWORK - S0214" -> "mitre-enterprise-attack-attack-pattern=System Information Discovery - T1082" [label="uses",];"tool=HAPPYWORK" [label="tool\nHAPPYWORK",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/211cfe9f-2676-4e1c-a5f5-2c8091da2a68.png b/static/graphs/211cfe9f-2676-4e1c-a5f5-2c8091da2a68.png new file mode 100644 index 0000000..1c5be91 Binary files /dev/null and b/static/graphs/211cfe9f-2676-4e1c-a5f5-2c8091da2a68.png differ diff --git a/static/graphs/213cdde9-c11a-4ea9-8ce0-c868e9826fec b/static/graphs/213cdde9-c11a-4ea9-8ce0-c868e9826fec new file mode 100644 index 0000000..50da715 --- /dev/null +++ b/static/graphs/213cdde9-c11a-4ea9-8ce0-c868e9826fec @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"microsoft-activity-group=STRONTIUM" [label="microsoft-activity-group\nSTRONTIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=STRONTIUM" -> "mitre-pre-attack-intrusion-set=APT28 - G0007" [label="similar",dir="both"];"microsoft-activity-group=STRONTIUM" -> "threat-actor=Sofacy" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT28 - G0007" [label="mitre-enterprise-attack-intrusion-set\nAPT28 - G0007",shape=octagon,style=filled,color=indianred1];"mitre-mobile-attack-intrusion-set=APT28 - G0007" [label="mitre-mobile-attack-intrusion-set\nAPT28 - G0007",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT28 - G0007" [label="mitre-pre-attack-intrusion-set\nAPT28 - G0007",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT28 - G0007" -> "mitre-enterprise-attack-attack-pattern=Rundll32 - T1085" [label="uses",];"mitre-pre-attack-intrusion-set=APT28 - G0007" -> "mitre-enterprise-attack-attack-pattern=Spearphishing Attachment - T1193" [label="uses",];"threat-actor=Sofacy" [label="threat-actor\nSofacy",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/213cdde9-c11a-4ea9-8ce0-c868e9826fec.png b/static/graphs/213cdde9-c11a-4ea9-8ce0-c868e9826fec.png new file mode 100644 index 0000000..439bc33 Binary files /dev/null and b/static/graphs/213cdde9-c11a-4ea9-8ce0-c868e9826fec.png differ diff --git a/static/graphs/218ae39b-2f92-4355-91c6-50cce319d26d b/static/graphs/218ae39b-2f92-4355-91c6-50cce319d26d new file mode 100644 index 0000000..d466f52 --- /dev/null +++ b/static/graphs/218ae39b-2f92-4355-91c6-50cce319d26d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"exploit-kit=Neutrino" [label="exploit-kit\nNeutrino",shape=box,style=filled,color=deepskyblue];"exploit-kit=Neutrino" -> "malpedia=Neutrino" [label="similar",dir="both"];} diff --git a/static/graphs/218ae39b-2f92-4355-91c6-50cce319d26d.png b/static/graphs/218ae39b-2f92-4355-91c6-50cce319d26d.png new file mode 100644 index 0000000..0f086f1 Binary files /dev/null and b/static/graphs/218ae39b-2f92-4355-91c6-50cce319d26d.png differ diff --git a/static/graphs/2195387d-ad9c-47e6-8f14-a49388b26eab b/static/graphs/2195387d-ad9c-47e6-8f14-a49388b26eab new file mode 100644 index 0000000..aeb758a --- /dev/null +++ b/static/graphs/2195387d-ad9c-47e6-8f14-a49388b26eab @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Zlader" [label="ransomware\nZlader",shape=box,style=filled,color=deepskyblue];"ransomware=Zlader" -> "ransomware=VaultCrypt" [label="similar",dir="both"];"ransomware=VaultCrypt" [label="ransomware\nVaultCrypt",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/2195387d-ad9c-47e6-8f14-a49388b26eab.png b/static/graphs/2195387d-ad9c-47e6-8f14-a49388b26eab.png new file mode 100644 index 0000000..b268fa5 Binary files /dev/null and b/static/graphs/2195387d-ad9c-47e6-8f14-a49388b26eab.png differ diff --git a/static/graphs/222fbd21-fc4f-4b7e-9f85-0e6e3a76c33f b/static/graphs/222fbd21-fc4f-4b7e-9f85-0e6e3a76c33f new file mode 100644 index 0000000..53f343c --- /dev/null +++ b/static/graphs/222fbd21-fc4f-4b7e-9f85-0e6e3a76c33f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=menuPass - G0045" [label="mitre-enterprise-attack-intrusion-set\nmenuPass - G0045",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=menuPass - G0045" -> "threat-actor=Stone Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=menuPass - G0045" -> "mitre-enterprise-attack-attack-pattern=Windows Management Instrumentation - T1047" [label="uses",];"threat-actor=Stone Panda" [label="threat-actor\nStone Panda",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/222fbd21-fc4f-4b7e-9f85-0e6e3a76c33f.png b/static/graphs/222fbd21-fc4f-4b7e-9f85-0e6e3a76c33f.png new file mode 100644 index 0000000..39b19ce Binary files /dev/null and b/static/graphs/222fbd21-fc4f-4b7e-9f85-0e6e3a76c33f.png differ diff --git a/static/graphs/22332d52-c0c2-443c-9ffb-f08c0d23722c b/static/graphs/22332d52-c0c2-443c-9ffb-f08c0d23722c new file mode 100644 index 0000000..d5657b5 --- /dev/null +++ b/static/graphs/22332d52-c0c2-443c-9ffb-f08c0d23722c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Turla" [label="tool\nTurla",shape=box,style=filled,color=deepskyblue];"tool=Turla" -> "mitre-enterprise-attack-malware=Uroburos - S0022" [label="similar",dir="both"];"tool=Turla" -> "malpedia=Uroburos (Windows)" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Uroburos - S0022" [label="mitre-enterprise-attack-malware\nUroburos - S0022",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Uroburos - S0022" -> "mitre-enterprise-attack-attack-pattern=Software Packing - T1045" [label="uses",];} diff --git a/static/graphs/22332d52-c0c2-443c-9ffb-f08c0d23722c.png b/static/graphs/22332d52-c0c2-443c-9ffb-f08c0d23722c.png new file mode 100644 index 0000000..0573176 Binary files /dev/null and b/static/graphs/22332d52-c0c2-443c-9ffb-f08c0d23722c.png differ diff --git a/static/graphs/22addc7b-b39f-483d-979a-1b35147da5de b/static/graphs/22addc7b-b39f-483d-979a-1b35147da5de new file mode 100644 index 0000000..028fd69 --- /dev/null +++ b/static/graphs/22addc7b-b39f-483d-979a-1b35147da5de @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=WinMM - S0059" [label="mitre-enterprise-attack-malware\nWinMM - S0059",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=WinMM - S0059" -> "malpedia=WinMM" [label="similar",dir="both"];"mitre-enterprise-attack-malware=WinMM - S0059" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/22addc7b-b39f-483d-979a-1b35147da5de.png b/static/graphs/22addc7b-b39f-483d-979a-1b35147da5de.png new file mode 100644 index 0000000..631c8b8 Binary files /dev/null and b/static/graphs/22addc7b-b39f-483d-979a-1b35147da5de.png differ diff --git a/static/graphs/22b75148-9d58-4fa7-8459-6ef25bbaf759 b/static/graphs/22b75148-9d58-4fa7-8459-6ef25bbaf759 new file mode 100644 index 0000000..51d4004 --- /dev/null +++ b/static/graphs/22b75148-9d58-4fa7-8459-6ef25bbaf759 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Reaver" [label="tool\nReaver",shape=box,style=filled,color=deepskyblue];"tool=Reaver" -> "tool=SunOrcal" [label="similar",dir="both"];"tool=Reaver" -> "tool=SURTR" [label="similar",dir="both"];"tool=SURTR" [label="tool\nSURTR",shape=box,style=filled,color=deepskyblue];"tool=SunOrcal" [label="tool\nSunOrcal",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/22b75148-9d58-4fa7-8459-6ef25bbaf759.png b/static/graphs/22b75148-9d58-4fa7-8459-6ef25bbaf759.png new file mode 100644 index 0000000..6907fbf Binary files /dev/null and b/static/graphs/22b75148-9d58-4fa7-8459-6ef25bbaf759.png differ diff --git a/static/graphs/23040c15-e7d8-47b5-8c16-8fd3e0e297fe b/static/graphs/23040c15-e7d8-47b5-8c16-8fd3e0e297fe new file mode 100644 index 0000000..b0161de --- /dev/null +++ b/static/graphs/23040c15-e7d8-47b5-8c16-8fd3e0e297fe @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=NotCompatible - MOB-S0015" [label="mitre-mobile-attack-malware\nNotCompatible - MOB-S0015",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=NotCompatible - MOB-S0015" -> "mitre-mobile-attack-attack-pattern=Exploit Enterprise Resources - MOB-T1031" [label="uses",];} diff --git a/static/graphs/23040c15-e7d8-47b5-8c16-8fd3e0e297fe.png b/static/graphs/23040c15-e7d8-47b5-8c16-8fd3e0e297fe.png new file mode 100644 index 0000000..18739c9 Binary files /dev/null and b/static/graphs/23040c15-e7d8-47b5-8c16-8fd3e0e297fe.png differ diff --git a/static/graphs/23061b40-a7b6-454f-8950-95d5ff80331c b/static/graphs/23061b40-a7b6-454f-8950-95d5ff80331c new file mode 100644 index 0000000..c541308 --- /dev/null +++ b/static/graphs/23061b40-a7b6-454f-8950-95d5ff80331c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Install Root Certificate Mitigation - T1130" [label="mitre-enterprise-attack-course-of-action\nInstall Root Certificate Mitigation - T1130",shape=ellipse];"mitre-enterprise-attack-course-of-action=Install Root Certificate Mitigation - T1130" -> "mitre-enterprise-attack-attack-pattern=Install Root Certificate - T1130" [label="mitigates",];} diff --git a/static/graphs/23061b40-a7b6-454f-8950-95d5ff80331c.png b/static/graphs/23061b40-a7b6-454f-8950-95d5ff80331c.png new file mode 100644 index 0000000..b89ea87 Binary files /dev/null and b/static/graphs/23061b40-a7b6-454f-8950-95d5ff80331c.png differ diff --git a/static/graphs/234e7770-99b0-4f65-b983-d3230f76a60b b/static/graphs/234e7770-99b0-4f65-b983-d3230f76a60b new file mode 100644 index 0000000..7fdf713 --- /dev/null +++ b/static/graphs/234e7770-99b0-4f65-b983-d3230f76a60b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Janicab - S0163" [label="mitre-enterprise-attack-malware\nJanicab - S0163",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Janicab - S0163" -> "tool=Janicab" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Janicab - S0163" -> "mitre-enterprise-attack-attack-pattern=Local Job Scheduling - T1168" [label="uses",];"tool=Janicab" [label="tool\nJanicab",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/234e7770-99b0-4f65-b983-d3230f76a60b.png b/static/graphs/234e7770-99b0-4f65-b983-d3230f76a60b.png new file mode 100644 index 0000000..284b88d Binary files /dev/null and b/static/graphs/234e7770-99b0-4f65-b983-d3230f76a60b.png differ diff --git a/static/graphs/235832b0-ee82-4ed9-8cbd-99cd3cc3596c b/static/graphs/235832b0-ee82-4ed9-8cbd-99cd3cc3596c new file mode 100644 index 0000000..3f54bd7 --- /dev/null +++ b/static/graphs/235832b0-ee82-4ed9-8cbd-99cd3cc3596c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=GoldFinder" [label="tool\nGoldFinder",shape=box,style=filled,color=deepskyblue];"tool=GoldFinder" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"microsoft-activity-group=NOBELIUM" [label="microsoft-activity-group\nNOBELIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=NOBELIUM" -> "threat-actor=UNC2452" [label="similar",dir="both"];"microsoft-activity-group=NOBELIUM" -> "backdoor=SUNBURST" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=TEARDROP" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=GoldMax" [label="uses",];"backdoor=SUNBURST" [label="backdoor\nSUNBURST",shape=box,style=filled,color=deepskyblue];"backdoor=SUNBURST" -> "tool=SUNSPOT" [label="dropped-by",];"backdoor=SUNBURST" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"threat-actor=UNC2452" [label="threat-actor\nUNC2452",shape=octagon,style=filled,color=indianred1];"tool=TEARDROP" [label="tool\nTEARDROP",shape=box,style=filled,color=deepskyblue];"tool=TEARDROP" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=TEARDROP" -> "tool=Raindrop" [label="variant-of",];"tool=GoldMax" [label="tool\nGoldMax",shape=box,style=filled,color=deepskyblue];"tool=GoldMax" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=SUNSPOT" [label="tool\nSUNSPOT",shape=box,style=filled,color=deepskyblue];"tool=SUNSPOT" -> "backdoor=SUNBURST" [label="dropped",];"tool=Raindrop" [label="tool\nRaindrop",shape=box,style=filled,color=deepskyblue];"tool=Raindrop" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=Raindrop" -> "tool=TEARDROP" [label="variant-of",];} diff --git a/static/graphs/235832b0-ee82-4ed9-8cbd-99cd3cc3596c.png b/static/graphs/235832b0-ee82-4ed9-8cbd-99cd3cc3596c.png new file mode 100644 index 0000000..7e2a396 Binary files /dev/null and b/static/graphs/235832b0-ee82-4ed9-8cbd-99cd3cc3596c.png differ diff --git a/static/graphs/23b6a0f5-fa95-46f9-a6f3-4549c5e45ec8 b/static/graphs/23b6a0f5-fa95-46f9-a6f3-4549c5e45ec8 new file mode 100644 index 0000000..b1e2056 --- /dev/null +++ b/static/graphs/23b6a0f5-fa95-46f9-a6f3-4549c5e45ec8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Night Dragon - G0014" [label="mitre-enterprise-attack-intrusion-set\nNight Dragon - G0014",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Night Dragon - G0014" -> "threat-actor=Night Dragon" [label="similar",dir="both"];"mitre-pre-attack-intrusion-set=Night Dragon - G0014" [label="mitre-pre-attack-intrusion-set\nNight Dragon - G0014",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Night Dragon - G0014" -> "mitre-enterprise-attack-malware=gh0st - S0032" [label="uses",];"mitre-pre-attack-intrusion-set=Night Dragon - G0014" -> "mitre-enterprise-attack-attack-pattern=Valid Accounts - T1078" [label="uses",];"mitre-enterprise-attack-malware=gh0st - S0032" [label="mitre-enterprise-attack-malware\ngh0st - S0032",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=gh0st - S0032" -> "tool=gh0st" [label="similar",dir="both"];"mitre-enterprise-attack-malware=gh0st - S0032" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];"threat-actor=Night Dragon" [label="threat-actor\nNight Dragon",shape=octagon,style=filled,color=indianred1];"tool=gh0st" [label="tool\ngh0st",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/23b6a0f5-fa95-46f9-a6f3-4549c5e45ec8.png b/static/graphs/23b6a0f5-fa95-46f9-a6f3-4549c5e45ec8.png new file mode 100644 index 0000000..381871f Binary files /dev/null and b/static/graphs/23b6a0f5-fa95-46f9-a6f3-4549c5e45ec8.png differ diff --git a/static/graphs/23bff3ce-021c-4e7a-9aee-60fd40bc7c6c b/static/graphs/23bff3ce-021c-4e7a-9aee-60fd40bc7c6c new file mode 100644 index 0000000..c88cb12 --- /dev/null +++ b/static/graphs/23bff3ce-021c-4e7a-9aee-60fd40bc7c6c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Sudo Mitigation - T1169" [label="mitre-enterprise-attack-course-of-action\nSudo Mitigation - T1169",shape=ellipse];"mitre-enterprise-attack-course-of-action=Sudo Mitigation - T1169" -> "mitre-enterprise-attack-attack-pattern=Sudo - T1169" [label="mitigates",];} diff --git a/static/graphs/23bff3ce-021c-4e7a-9aee-60fd40bc7c6c.png b/static/graphs/23bff3ce-021c-4e7a-9aee-60fd40bc7c6c.png new file mode 100644 index 0000000..3a280e6 Binary files /dev/null and b/static/graphs/23bff3ce-021c-4e7a-9aee-60fd40bc7c6c.png differ diff --git a/static/graphs/23f6da78-873a-4ab0-9167-c8b0563627a5 b/static/graphs/23f6da78-873a-4ab0-9167-c8b0563627a5 new file mode 100644 index 0000000..65a7581 --- /dev/null +++ b/static/graphs/23f6da78-873a-4ab0-9167-c8b0563627a5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Bisonal" [label="tool\nBisonal",shape=box,style=filled,color=deepskyblue];"tool=Bisonal" -> "malpedia=Korlia" [label="similar",dir="both"];} diff --git a/static/graphs/23f6da78-873a-4ab0-9167-c8b0563627a5.png b/static/graphs/23f6da78-873a-4ab0-9167-c8b0563627a5.png new file mode 100644 index 0000000..369f2e8 Binary files /dev/null and b/static/graphs/23f6da78-873a-4ab0-9167-c8b0563627a5.png differ diff --git a/static/graphs/24110866-cb22-4c85-a7d2-0413e126694b b/static/graphs/24110866-cb22-4c85-a7d2-0413e126694b new file mode 100644 index 0000000..b610ce4 --- /dev/null +++ b/static/graphs/24110866-cb22-4c85-a7d2-0413e126694b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Axiom" [label="threat-actor\nAxiom",shape=octagon,style=filled,color=indianred1];"threat-actor=Axiom" -> "mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" [label="similar",dir="both"];"threat-actor=Axiom" -> "mitre-pre-attack-intrusion-set=APT17 - G0025" [label="similar",dir="both"];"threat-actor=Axiom" -> "threat-actor=Aurora Panda" [label="similar",dir="both"];"threat-actor=Axiom" -> "mitre-enterprise-attack-intrusion-set=Axiom - G0001" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" [label="mitre-enterprise-attack-intrusion-set\nWinnti Group - G0044",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];"mitre-enterprise-attack-intrusion-set=APT17 - G0025" [label="mitre-enterprise-attack-intrusion-set\nAPT17 - G0025",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" [label="mitre-enterprise-attack-intrusion-set\nAxiom - G0001",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" -> "mitre-enterprise-attack-attack-pattern=Exploit Public-Facing Application - T1190" [label="uses",];"mitre-pre-attack-intrusion-set=APT17 - G0025" [label="mitre-pre-attack-intrusion-set\nAPT17 - G0025",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT17 - G0025" -> "mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" [label="uses",];"threat-actor=Aurora Panda" [label="threat-actor\nAurora Panda",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" [label="mitre-enterprise-attack-malware\nBLACKCOFFEE - S0069",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/24110866-cb22-4c85-a7d2-0413e126694b.png b/static/graphs/24110866-cb22-4c85-a7d2-0413e126694b.png new file mode 100644 index 0000000..4bf0727 Binary files /dev/null and b/static/graphs/24110866-cb22-4c85-a7d2-0413e126694b.png differ diff --git a/static/graphs/242f3da3-4425-4d11-8f5c-b842886da966 b/static/graphs/242f3da3-4425-4d11-8f5c-b842886da966 new file mode 100644 index 0000000..3457486 --- /dev/null +++ b/static/graphs/242f3da3-4425-4d11-8f5c-b842886da966 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Windows Credential Editor - S0005" [label="mitre-enterprise-attack-tool\nWindows Credential Editor - S0005",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Windows Credential Editor - S0005" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];} diff --git a/static/graphs/242f3da3-4425-4d11-8f5c-b842886da966.png b/static/graphs/242f3da3-4425-4d11-8f5c-b842886da966.png new file mode 100644 index 0000000..837fb3e Binary files /dev/null and b/static/graphs/242f3da3-4425-4d11-8f5c-b842886da966.png differ diff --git a/static/graphs/24478001-2eb3-4b06-a02e-96b3d61d27ec b/static/graphs/24478001-2eb3-4b06-a02e-96b3d61d27ec new file mode 100644 index 0000000..8e822d3 --- /dev/null +++ b/static/graphs/24478001-2eb3-4b06-a02e-96b3d61d27ec @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Multilayer Encryption Mitigation - T1079" [label="mitre-enterprise-attack-course-of-action\nMultilayer Encryption Mitigation - T1079",shape=ellipse];"mitre-enterprise-attack-course-of-action=Multilayer Encryption Mitigation - T1079" -> "mitre-enterprise-attack-attack-pattern=Multilayer Encryption - T1079" [label="mitigates",];} diff --git a/static/graphs/24478001-2eb3-4b06-a02e-96b3d61d27ec.png b/static/graphs/24478001-2eb3-4b06-a02e-96b3d61d27ec.png new file mode 100644 index 0000000..ab36338 Binary files /dev/null and b/static/graphs/24478001-2eb3-4b06-a02e-96b3d61d27ec.png differ diff --git a/static/graphs/2448a4e1-46e3-4c42-9fd1-f51f8ede58c1 b/static/graphs/2448a4e1-46e3-4c42-9fd1-f51f8ede58c1 new file mode 100644 index 0000000..ff9c66f --- /dev/null +++ b/static/graphs/2448a4e1-46e3-4c42-9fd1-f51f8ede58c1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=ShadowPad" [label="tool\nShadowPad",shape=box,style=filled,color=deepskyblue];"tool=ShadowPad" -> "malpedia=ShadowPad" [label="similar",dir="both"];} diff --git a/static/graphs/2448a4e1-46e3-4c42-9fd1-f51f8ede58c1.png b/static/graphs/2448a4e1-46e3-4c42-9fd1-f51f8ede58c1.png new file mode 100644 index 0000000..5264fe1 Binary files /dev/null and b/static/graphs/2448a4e1-46e3-4c42-9fd1-f51f8ede58c1.png differ diff --git a/static/graphs/247cb30b-955f-42eb-97a5-a89fef69341e b/static/graphs/247cb30b-955f-42eb-97a5-a89fef69341e new file mode 100644 index 0000000..eefac8c --- /dev/null +++ b/static/graphs/247cb30b-955f-42eb-97a5-a89fef69341e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=APT32 - G0050" [label="mitre-enterprise-attack-intrusion-set\nAPT32 - G0050",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT32 - G0050" -> "threat-actor=APT32" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT32 - G0050" -> "mitre-enterprise-attack-attack-pattern=Scheduled Task - T1053" [label="uses",];"threat-actor=APT32" [label="threat-actor\nAPT32",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/247cb30b-955f-42eb-97a5-a89fef69341e.png b/static/graphs/247cb30b-955f-42eb-97a5-a89fef69341e.png new file mode 100644 index 0000000..89546d0 Binary files /dev/null and b/static/graphs/247cb30b-955f-42eb-97a5-a89fef69341e.png differ diff --git a/static/graphs/2497ac92-e751-4391-82c6-1b86e34d0294 b/static/graphs/2497ac92-e751-4391-82c6-1b86e34d0294 new file mode 100644 index 0000000..0fe7d93 --- /dev/null +++ b/static/graphs/2497ac92-e751-4391-82c6-1b86e34d0294 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Automated Exfiltration Mitigation - T1020" [label="mitre-enterprise-attack-course-of-action\nAutomated Exfiltration Mitigation - T1020",shape=ellipse];"mitre-enterprise-attack-course-of-action=Automated Exfiltration Mitigation - T1020" -> "mitre-enterprise-attack-attack-pattern=Automated Exfiltration - T1020" [label="mitigates",];} diff --git a/static/graphs/2497ac92-e751-4391-82c6-1b86e34d0294.png b/static/graphs/2497ac92-e751-4391-82c6-1b86e34d0294.png new file mode 100644 index 0000000..2eedb2e Binary files /dev/null and b/static/graphs/2497ac92-e751-4391-82c6-1b86e34d0294.png differ diff --git a/static/graphs/24ee55e3-697f-482f-8fa8-d05999df40cd b/static/graphs/24ee55e3-697f-482f-8fa8-d05999df40cd new file mode 100644 index 0000000..0e86531 --- /dev/null +++ b/static/graphs/24ee55e3-697f-482f-8fa8-d05999df40cd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=KONNI" [label="tool\nKONNI",shape=box,style=filled,color=deepskyblue];"tool=KONNI" -> "rat=Konni" [label="similar",dir="both"];"tool=KONNI" -> "malpedia=Konni" [label="similar",dir="both"];"rat=Konni" [label="rat\nKonni",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/24ee55e3-697f-482f-8fa8-d05999df40cd.png b/static/graphs/24ee55e3-697f-482f-8fa8-d05999df40cd.png new file mode 100644 index 0000000..8cd9a9c Binary files /dev/null and b/static/graphs/24ee55e3-697f-482f-8fa8-d05999df40cd.png differ diff --git a/static/graphs/251fbae2-78f6-4de7-84f6-194c727a64ad b/static/graphs/251fbae2-78f6-4de7-84f6-194c727a64ad new file mode 100644 index 0000000..f0e6844 --- /dev/null +++ b/static/graphs/251fbae2-78f6-4de7-84f6-194c727a64ad @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Lurid - S0010" [label="mitre-enterprise-attack-malware\nLurid - S0010",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Lurid - S0010" -> "malpedia=Enfal" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Lurid - S0010" -> "mitre-enterprise-attack-attack-pattern=Custom Cryptographic Protocol - T1024" [label="uses",];} diff --git a/static/graphs/251fbae2-78f6-4de7-84f6-194c727a64ad.png b/static/graphs/251fbae2-78f6-4de7-84f6-194c727a64ad.png new file mode 100644 index 0000000..e2942f2 Binary files /dev/null and b/static/graphs/251fbae2-78f6-4de7-84f6-194c727a64ad.png differ diff --git a/static/graphs/254f4f67-d850-4dc5-8ddb-2e955ddea287 b/static/graphs/254f4f67-d850-4dc5-8ddb-2e955ddea287 new file mode 100644 index 0000000..c230019 --- /dev/null +++ b/static/graphs/254f4f67-d850-4dc5-8ddb-2e955ddea287 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=HiddenTear" [label="ransomware\nHiddenTear",shape=box,style=filled,color=deepskyblue];"ransomware=HiddenTear" -> "malpedia=EDA2" [label="similar",dir="both"];"ransomware=HiddenTear" -> "malpedia=HiddenTear" [label="similar",dir="both"];} diff --git a/static/graphs/254f4f67-d850-4dc5-8ddb-2e955ddea287.png b/static/graphs/254f4f67-d850-4dc5-8ddb-2e955ddea287.png new file mode 100644 index 0000000..a875b89 Binary files /dev/null and b/static/graphs/254f4f67-d850-4dc5-8ddb-2e955ddea287.png differ diff --git a/static/graphs/255a59a7-db2d-44fc-9ca9-5859b65817c3 b/static/graphs/255a59a7-db2d-44fc-9ca9-5859b65817c3 new file mode 100644 index 0000000..1eb8d59 --- /dev/null +++ b/static/graphs/255a59a7-db2d-44fc-9ca9-5859b65817c3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="similar",dir="both"];"rat=PoisonIvy" -> "tool=poisonivy" [label="similar",dir="both"];"rat=PoisonIvy" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/255a59a7-db2d-44fc-9ca9-5859b65817c3.png b/static/graphs/255a59a7-db2d-44fc-9ca9-5859b65817c3.png new file mode 100644 index 0000000..6dc45ea Binary files /dev/null and b/static/graphs/255a59a7-db2d-44fc-9ca9-5859b65817c3.png differ diff --git a/static/graphs/255aac37-e4d2-4eeb-b8de-143f9c2321bd b/static/graphs/255aac37-e4d2-4eeb-b8de-143f9c2321bd new file mode 100644 index 0000000..eb8a76e --- /dev/null +++ b/static/graphs/255aac37-e4d2-4eeb-b8de-143f9c2321bd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptXXX" [label="ransomware\nCryptXXX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptXXX" -> "ransomware=CryptXXX 2.0" [label="similar",dir="both"];"ransomware=CryptXXX 2.0" [label="ransomware\nCryptXXX 2.0",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/255aac37-e4d2-4eeb-b8de-143f9c2321bd.png b/static/graphs/255aac37-e4d2-4eeb-b8de-143f9c2321bd.png new file mode 100644 index 0000000..10597ad Binary files /dev/null and b/static/graphs/255aac37-e4d2-4eeb-b8de-143f9c2321bd.png differ diff --git a/static/graphs/25cd01bc-1346-4415-8f8d-d3656309ef6b b/static/graphs/25cd01bc-1346-4415-8f8d-d3656309ef6b new file mode 100644 index 0000000..c11f658 --- /dev/null +++ b/static/graphs/25cd01bc-1346-4415-8f8d-d3656309ef6b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Hoardy" [label="tool\nHoardy",shape=box,style=filled,color=deepskyblue];"tool=Hoardy" -> "mitre-enterprise-attack-malware=BS2005 - S0014" [label="similar",dir="both"];"tool=Hoardy" -> "malpedia=BS2005" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BS2005 - S0014" [label="mitre-enterprise-attack-malware\nBS2005 - S0014",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BS2005 - S0014" -> "mitre-enterprise-attack-attack-pattern=Data Encoding - T1132" [label="uses",];} diff --git a/static/graphs/25cd01bc-1346-4415-8f8d-d3656309ef6b.png b/static/graphs/25cd01bc-1346-4415-8f8d-d3656309ef6b.png new file mode 100644 index 0000000..387a997 Binary files /dev/null and b/static/graphs/25cd01bc-1346-4415-8f8d-d3656309ef6b.png differ diff --git a/static/graphs/25d5e1d8-c6fb-4735-bc57-115a21222f4b b/static/graphs/25d5e1d8-c6fb-4735-bc57-115a21222f4b new file mode 100644 index 0000000..0ecfcfd --- /dev/null +++ b/static/graphs/25d5e1d8-c6fb-4735-bc57-115a21222f4b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Application Window Discovery Mitigation - T1010" [label="mitre-enterprise-attack-course-of-action\nApplication Window Discovery Mitigation - T1010",shape=ellipse];"mitre-enterprise-attack-course-of-action=Application Window Discovery Mitigation - T1010" -> "mitre-enterprise-attack-attack-pattern=Application Window Discovery - T1010" [label="mitigates",];} diff --git a/static/graphs/25d5e1d8-c6fb-4735-bc57-115a21222f4b.png b/static/graphs/25d5e1d8-c6fb-4735-bc57-115a21222f4b.png new file mode 100644 index 0000000..8720a6e Binary files /dev/null and b/static/graphs/25d5e1d8-c6fb-4735-bc57-115a21222f4b.png differ diff --git a/static/graphs/25dc1ce8-eb55-4333-ae30-a7cb4f5894a1 b/static/graphs/25dc1ce8-eb55-4333-ae30-a7cb4f5894a1 new file mode 100644 index 0000000..d4bc5db --- /dev/null +++ b/static/graphs/25dc1ce8-eb55-4333-ae30-a7cb4f5894a1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=Application Developer Guidance - MOB-M1013" [label="mitre-mobile-attack-course-of-action\nApplication Developer Guidance - MOB-M1013",shape=ellipse];"mitre-mobile-attack-course-of-action=Application Developer Guidance - MOB-M1013" -> "mitre-mobile-attack-attack-pattern=Access Sensitive Data in Device Logs - MOB-T1016" [label="mitigates",];} diff --git a/static/graphs/25dc1ce8-eb55-4333-ae30-a7cb4f5894a1.png b/static/graphs/25dc1ce8-eb55-4333-ae30-a7cb4f5894a1.png new file mode 100644 index 0000000..c8f8b5c Binary files /dev/null and b/static/graphs/25dc1ce8-eb55-4333-ae30-a7cb4f5894a1.png differ diff --git a/static/graphs/25e53928-6f33-49b7-baee-8180578286f6 b/static/graphs/25e53928-6f33-49b7-baee-8180578286f6 new file mode 100644 index 0000000..5c9e973 --- /dev/null +++ b/static/graphs/25e53928-6f33-49b7-baee-8180578286f6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=System Firmware Mitigation - T1019" [label="mitre-enterprise-attack-course-of-action\nSystem Firmware Mitigation - T1019",shape=ellipse];"mitre-enterprise-attack-course-of-action=System Firmware Mitigation - T1019" -> "mitre-enterprise-attack-attack-pattern=System Firmware - T1019" [label="mitigates",];} diff --git a/static/graphs/25e53928-6f33-49b7-baee-8180578286f6.png b/static/graphs/25e53928-6f33-49b7-baee-8180578286f6.png new file mode 100644 index 0000000..b656065 Binary files /dev/null and b/static/graphs/25e53928-6f33-49b7-baee-8180578286f6.png differ diff --git a/static/graphs/269e8108-68c6-4f99-b911-14b2e765dec2 b/static/graphs/269e8108-68c6-4f99-b911-14b2e765dec2 new file mode 100644 index 0000000..d443e85 --- /dev/null +++ b/static/graphs/269e8108-68c6-4f99-b911-14b2e765dec2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=MuddyWater - G0069" [label="mitre-enterprise-attack-intrusion-set\nMuddyWater - G0069",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=MuddyWater - G0069" -> "threat-actor=MuddyWater" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=MuddyWater - G0069" -> "mitre-enterprise-attack-attack-pattern=Mshta - T1170" [label="uses",];"threat-actor=MuddyWater" [label="threat-actor\nMuddyWater",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/269e8108-68c6-4f99-b911-14b2e765dec2.png b/static/graphs/269e8108-68c6-4f99-b911-14b2e765dec2.png new file mode 100644 index 0000000..68642d4 Binary files /dev/null and b/static/graphs/269e8108-68c6-4f99-b911-14b2e765dec2.png differ diff --git a/static/graphs/26c8b446-305c-4057-83bc-85b09630281e b/static/graphs/26c8b446-305c-4057-83bc-85b09630281e new file mode 100644 index 0000000..b61969e --- /dev/null +++ b/static/graphs/26c8b446-305c-4057-83bc-85b09630281e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoFortress" [label="ransomware\nCryptoFortress",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoFortress" -> "ransomware=TorrentLocker" [label="similar",dir="both"];"ransomware=CryptoFortress" -> "malpedia=CryptoFortress" [label="similar",dir="both"];"ransomware=CryptoFortress" -> "malpedia=TorrentLocker" [label="similar",dir="both"];"ransomware=TorrentLocker" [label="ransomware\nTorrentLocker",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/26c8b446-305c-4057-83bc-85b09630281e.png b/static/graphs/26c8b446-305c-4057-83bc-85b09630281e.png new file mode 100644 index 0000000..959d23d Binary files /dev/null and b/static/graphs/26c8b446-305c-4057-83bc-85b09630281e.png differ diff --git a/static/graphs/26fa33ba-528c-49f8-94c2-db4047a37bd0 b/static/graphs/26fa33ba-528c-49f8-94c2-db4047a37bd0 new file mode 100644 index 0000000..0eb5789 --- /dev/null +++ b/static/graphs/26fa33ba-528c-49f8-94c2-db4047a37bd0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=Cryptomix-FILE" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/26fa33ba-528c-49f8-94c2-db4047a37bd0.png b/static/graphs/26fa33ba-528c-49f8-94c2-db4047a37bd0.png new file mode 100644 index 0000000..049f561 Binary files /dev/null and b/static/graphs/26fa33ba-528c-49f8-94c2-db4047a37bd0.png differ diff --git a/static/graphs/26fed817-e7bf-41f9-829a-9075ffac45c2 b/static/graphs/26fed817-e7bf-41f9-829a-9075ffac45c2 new file mode 100644 index 0000000..ef34fef --- /dev/null +++ b/static/graphs/26fed817-e7bf-41f9-829a-9075ffac45c2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Kasidet - S0088" [label="mitre-enterprise-attack-malware\nKasidet - S0088",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Kasidet - S0088" -> "malpedia=Neutrino" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Kasidet - S0088" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];} diff --git a/static/graphs/26fed817-e7bf-41f9-829a-9075ffac45c2.png b/static/graphs/26fed817-e7bf-41f9-829a-9075ffac45c2.png new file mode 100644 index 0000000..89fa681 Binary files /dev/null and b/static/graphs/26fed817-e7bf-41f9-829a-9075ffac45c2.png differ diff --git a/static/graphs/276c2c2e-09da-44cf-a3f7-806b3feb41da b/static/graphs/276c2c2e-09da-44cf-a3f7-806b3feb41da new file mode 100644 index 0000000..db7654c --- /dev/null +++ b/static/graphs/276c2c2e-09da-44cf-a3f7-806b3feb41da @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Dridex" [label="tool\nDridex",shape=box,style=filled,color=deepskyblue];"tool=Dridex" -> "banker=Dridex" [label="similar",dir="both"];"tool=Dridex" -> "malpedia=Dridex" [label="similar",dir="both"];"tool=Dridex" -> "banker=Feodo" [label="similar",dir="both"];"tool=Dridex" -> "malpedia=Feodo" [label="similar",dir="both"];"banker=Dridex" [label="banker\nDridex",shape=box,style=filled,color=deepskyblue];"banker=Feodo" [label="banker\nFeodo",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/276c2c2e-09da-44cf-a3f7-806b3feb41da.png b/static/graphs/276c2c2e-09da-44cf-a3f7-806b3feb41da.png new file mode 100644 index 0000000..abab2d9 Binary files /dev/null and b/static/graphs/276c2c2e-09da-44cf-a3f7-806b3feb41da.png differ diff --git a/static/graphs/277d2f87-2ae5-4730-a3aa-50c1fdff9656 b/static/graphs/277d2f87-2ae5-4730-a3aa-50c1fdff9656 new file mode 100644 index 0000000..af0c769 --- /dev/null +++ b/static/graphs/277d2f87-2ae5-4730-a3aa-50c1fdff9656 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Strider - G0041" [label="mitre-enterprise-attack-intrusion-set\nStrider - G0041",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Strider - G0041" -> "threat-actor=ProjectSauron" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Strider - G0041" -> "mitre-enterprise-attack-malware=Remsec - S0125" [label="uses",];"mitre-enterprise-attack-malware=Remsec - S0125" [label="mitre-enterprise-attack-malware\nRemsec - S0125",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Remsec - S0125" -> "malpedia=Remsec" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Remsec - S0125" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Alternative Protocol - T1048" [label="uses",];"threat-actor=ProjectSauron" [label="threat-actor\nProjectSauron",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/277d2f87-2ae5-4730-a3aa-50c1fdff9656.png b/static/graphs/277d2f87-2ae5-4730-a3aa-50c1fdff9656.png new file mode 100644 index 0000000..9531067 Binary files /dev/null and b/static/graphs/277d2f87-2ae5-4730-a3aa-50c1fdff9656.png differ diff --git a/static/graphs/27a7fd9b-ec9a-4f4a-b3f5-a3b81c71970a b/static/graphs/27a7fd9b-ec9a-4f4a-b3f5-a3b81c71970a new file mode 100644 index 0000000..0a477aa --- /dev/null +++ b/static/graphs/27a7fd9b-ec9a-4f4a-b3f5-a3b81c71970a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Donbot" [label="botnet\nDonbot",shape=box,style=filled,color=deepskyblue];"botnet=Donbot" -> "malpedia=Buzus" [label="similar",dir="both"];} diff --git a/static/graphs/27a7fd9b-ec9a-4f4a-b3f5-a3b81c71970a.png b/static/graphs/27a7fd9b-ec9a-4f4a-b3f5-a3b81c71970a.png new file mode 100644 index 0000000..c392247 Binary files /dev/null and b/static/graphs/27a7fd9b-ec9a-4f4a-b3f5-a3b81c71970a.png differ diff --git a/static/graphs/281563d8-14f8-43a8-a0cb-2f0198f7146c b/static/graphs/281563d8-14f8-43a8-a0cb-2f0198f7146c new file mode 100644 index 0000000..4e12c0d --- /dev/null +++ b/static/graphs/281563d8-14f8-43a8-a0cb-2f0198f7146c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=NetDevil" [label="rat\nNetDevil",shape=box,style=filled,color=deepskyblue];"rat=NetDevil" -> "rat=Net Devil" [label="similar",dir="both"];"rat=Net Devil" [label="rat\nNet Devil",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/281563d8-14f8-43a8-a0cb-2f0198f7146c.png b/static/graphs/281563d8-14f8-43a8-a0cb-2f0198f7146c.png new file mode 100644 index 0000000..7c0dee1 Binary files /dev/null and b/static/graphs/281563d8-14f8-43a8-a0cb-2f0198f7146c.png differ diff --git a/static/graphs/2815a353-cd56-4ed0-8581-812b94f7a326 b/static/graphs/2815a353-cd56-4ed0-8581-812b94f7a326 new file mode 100644 index 0000000..53ba698 --- /dev/null +++ b/static/graphs/2815a353-cd56-4ed0-8581-812b94f7a326 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=VB Flash" [label="tool\nVB Flash",shape=box,style=filled,color=deepskyblue];"tool=VB Flash" -> "mitre-enterprise-attack-malware=HALFBAKED - S0151" [label="similar",dir="both"];"mitre-enterprise-attack-malware=HALFBAKED - S0151" [label="mitre-enterprise-attack-malware\nHALFBAKED - S0151",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=HALFBAKED - S0151" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];} diff --git a/static/graphs/2815a353-cd56-4ed0-8581-812b94f7a326.png b/static/graphs/2815a353-cd56-4ed0-8581-812b94f7a326.png new file mode 100644 index 0000000..62807ca Binary files /dev/null and b/static/graphs/2815a353-cd56-4ed0-8581-812b94f7a326.png differ diff --git a/static/graphs/286cc500-4291-45c2-99a1-e760db176402 b/static/graphs/286cc500-4291-45c2-99a1-e760db176402 new file mode 100644 index 0000000..bbf457c --- /dev/null +++ b/static/graphs/286cc500-4291-45c2-99a1-e760db176402 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party infrastructure services - PRE-T1084" [label="mitre-pre-attack-attack-pattern\nAcquire and/or use 3rd party infrastructure services - PRE-T1084",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party infrastructure services - PRE-T1084" -> "mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party infrastructure services - PRE-T1106" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party infrastructure services - PRE-T1106" [label="mitre-pre-attack-attack-pattern\nAcquire and/or use 3rd party infrastructure services - PRE-T1106",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party infrastructure services - PRE-T1106" -> "mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party infrastructure services - PRE-T1084" [label="related-to",];} diff --git a/static/graphs/286cc500-4291-45c2-99a1-e760db176402.png b/static/graphs/286cc500-4291-45c2-99a1-e760db176402.png new file mode 100644 index 0000000..050c9f4 Binary files /dev/null and b/static/graphs/286cc500-4291-45c2-99a1-e760db176402.png differ diff --git a/static/graphs/28adf6fd-ab6c-4553-9aa7-cef18a191f33 b/static/graphs/28adf6fd-ab6c-4553-9aa7-cef18a191f33 new file mode 100644 index 0000000..035fddc --- /dev/null +++ b/static/graphs/28adf6fd-ab6c-4553-9aa7-cef18a191f33 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Data Compressed Mitigation - T1002" [label="mitre-enterprise-attack-course-of-action\nData Compressed Mitigation - T1002",shape=ellipse];"mitre-enterprise-attack-course-of-action=Data Compressed Mitigation - T1002" -> "mitre-enterprise-attack-attack-pattern=Data Compressed - T1002" [label="mitigates",];} diff --git a/static/graphs/28adf6fd-ab6c-4553-9aa7-cef18a191f33.png b/static/graphs/28adf6fd-ab6c-4553-9aa7-cef18a191f33.png new file mode 100644 index 0000000..b1d33fe Binary files /dev/null and b/static/graphs/28adf6fd-ab6c-4553-9aa7-cef18a191f33.png differ diff --git a/static/graphs/28c0f30c-32c3-4c6c-a474-74820e55854f b/static/graphs/28c0f30c-32c3-4c6c-a474-74820e55854f new file mode 100644 index 0000000..ddaea4f --- /dev/null +++ b/static/graphs/28c0f30c-32c3-4c6c-a474-74820e55854f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Signed Binary Proxy Execution Mitigation - T1218" [label="mitre-enterprise-attack-course-of-action\nSigned Binary Proxy Execution Mitigation - T1218",shape=ellipse];"mitre-enterprise-attack-course-of-action=Signed Binary Proxy Execution Mitigation - T1218" -> "mitre-enterprise-attack-attack-pattern=Signed Binary Proxy Execution - T1218" [label="mitigates",];} diff --git a/static/graphs/28c0f30c-32c3-4c6c-a474-74820e55854f.png b/static/graphs/28c0f30c-32c3-4c6c-a474-74820e55854f.png new file mode 100644 index 0000000..ba4635c Binary files /dev/null and b/static/graphs/28c0f30c-32c3-4c6c-a474-74820e55854f.png differ diff --git a/static/graphs/28e39395-91e7-4f02-b694-5e079c964da9 b/static/graphs/28e39395-91e7-4f02-b694-5e079c964da9 new file mode 100644 index 0000000..d9062a1 --- /dev/null +++ b/static/graphs/28e39395-91e7-4f02-b694-5e079c964da9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=Trojan-SMS.AndroidOS.FakeInst.a - MOB-S0022" [label="mitre-mobile-attack-malware\nTrojan-SMS.AndroidOS.FakeInst.a - MOB-S0022",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Trojan-SMS.AndroidOS.FakeInst.a - MOB-S0022" -> "mitre-mobile-attack-attack-pattern=Standard Application Layer Protocol - MOB-T1040" [label="uses",];} diff --git a/static/graphs/28e39395-91e7-4f02-b694-5e079c964da9.png b/static/graphs/28e39395-91e7-4f02-b694-5e079c964da9.png new file mode 100644 index 0000000..bab42c4 Binary files /dev/null and b/static/graphs/28e39395-91e7-4f02-b694-5e079c964da9.png differ diff --git a/static/graphs/294e2560-bd48-44b2-9da2-833b5588ad11 b/static/graphs/294e2560-bd48-44b2-9da2-833b5588ad11 new file mode 100644 index 0000000..449340f --- /dev/null +++ b/static/graphs/294e2560-bd48-44b2-9da2-833b5588ad11 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=ipconfig - S0100" [label="mitre-enterprise-attack-tool\nipconfig - S0100",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=ipconfig - S0100" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];} diff --git a/static/graphs/294e2560-bd48-44b2-9da2-833b5588ad11.png b/static/graphs/294e2560-bd48-44b2-9da2-833b5588ad11.png new file mode 100644 index 0000000..e086671 Binary files /dev/null and b/static/graphs/294e2560-bd48-44b2-9da2-833b5588ad11.png differ diff --git a/static/graphs/29e52693-b325-4c14-93de-8f2ff9dca8bf b/static/graphs/29e52693-b325-4c14-93de-8f2ff9dca8bf new file mode 100644 index 0000000..6a3ecb0 --- /dev/null +++ b/static/graphs/29e52693-b325-4c14-93de-8f2ff9dca8bf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Pwnet" [label="tool\nPwnet",shape=box,style=filled,color=deepskyblue];"tool=Pwnet" -> "malpedia=Pwnet" [label="similar",dir="both"];} diff --git a/static/graphs/29e52693-b325-4c14-93de-8f2ff9dca8bf.png b/static/graphs/29e52693-b325-4c14-93de-8f2ff9dca8bf.png new file mode 100644 index 0000000..c5db9aa Binary files /dev/null and b/static/graphs/29e52693-b325-4c14-93de-8f2ff9dca8bf.png differ diff --git a/static/graphs/2a158b0a-7ef8-43cb-9985-bf34d1e12050 b/static/graphs/2a158b0a-7ef8-43cb-9985-bf34d1e12050 new file mode 100644 index 0000000..5e1a402 --- /dev/null +++ b/static/graphs/2a158b0a-7ef8-43cb-9985-bf34d1e12050 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Naikon - G0019" [label="mitre-enterprise-attack-intrusion-set\nNaikon - G0019",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" -> "threat-actor=Naikon" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" -> "threat-actor=Lotus Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" -> "threat-actor=APT 30" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" -> "mitre-enterprise-attack-intrusion-set=APT30 - G0013" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" -> "mitre-enterprise-attack-tool=netsh - S0108" [label="uses",];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" [label="mitre-enterprise-attack-intrusion-set\nAPT30 - G0013",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" -> "mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="uses",];"mitre-enterprise-attack-tool=netsh - S0108" [label="mitre-enterprise-attack-tool\nnetsh - S0108",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=netsh - S0108" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="uses",];"threat-actor=Naikon" [label="threat-actor\nNaikon",shape=octagon,style=filled,color=indianred1];"threat-actor=Lotus Panda" [label="threat-actor\nLotus Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=APT 30" [label="threat-actor\nAPT 30",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="mitre-enterprise-attack-malware\nBACKSPACE - S0031",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "tool=Backspace" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Command and Control Channel - T1041" [label="uses",];"tool=Backspace" [label="tool\nBackspace",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/2a158b0a-7ef8-43cb-9985-bf34d1e12050.png b/static/graphs/2a158b0a-7ef8-43cb-9985-bf34d1e12050.png new file mode 100644 index 0000000..2c093e6 Binary files /dev/null and b/static/graphs/2a158b0a-7ef8-43cb-9985-bf34d1e12050.png differ diff --git a/static/graphs/2a16a1d4-a098-4f17-80f3-3cfc6c60b539 b/static/graphs/2a16a1d4-a098-4f17-80f3-3cfc6c60b539 new file mode 100644 index 0000000..b30caf5 --- /dev/null +++ b/static/graphs/2a16a1d4-a098-4f17-80f3-3cfc6c60b539 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Yahoyah" [label="tool\nYahoyah",shape=box,style=filled,color=deepskyblue];"tool=Yahoyah" -> "malpedia=KeyBoy" [label="similar",dir="both"];"tool=Yahoyah" -> "malpedia=Yahoyah" [label="similar",dir="both"];"tool=Yahoyah" -> "tool=KeyBoy" [label="similar",dir="both"];"tool=KeyBoy" [label="tool\nKeyBoy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/2a16a1d4-a098-4f17-80f3-3cfc6c60b539.png b/static/graphs/2a16a1d4-a098-4f17-80f3-3cfc6c60b539.png new file mode 100644 index 0000000..52392cc Binary files /dev/null and b/static/graphs/2a16a1d4-a098-4f17-80f3-3cfc6c60b539.png differ diff --git a/static/graphs/2a18f5dd-40fc-444b-a7c6-85f94b3eee13 b/static/graphs/2a18f5dd-40fc-444b-a7c6-85f94b3eee13 new file mode 100644 index 0000000..37e10f2 --- /dev/null +++ b/static/graphs/2a18f5dd-40fc-444b-a7c6-85f94b3eee13 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Umbreon" [label="tool\nUmbreon",shape=box,style=filled,color=deepskyblue];"tool=Umbreon" -> "mitre-enterprise-attack-malware=Umbreon - S0221" [label="similar",dir="both"];"tool=Umbreon" -> "malpedia=Umbreon" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Umbreon - S0221" [label="mitre-enterprise-attack-malware\nUmbreon - S0221",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Umbreon - S0221" -> "mitre-enterprise-attack-attack-pattern=Rootkit - T1014" [label="uses",];} diff --git a/static/graphs/2a18f5dd-40fc-444b-a7c6-85f94b3eee13.png b/static/graphs/2a18f5dd-40fc-444b-a7c6-85f94b3eee13.png new file mode 100644 index 0000000..83b9234 Binary files /dev/null and b/static/graphs/2a18f5dd-40fc-444b-a7c6-85f94b3eee13.png differ diff --git a/static/graphs/2a410eea-a9da-11e8-b404-37b7060746c8 b/static/graphs/2a410eea-a9da-11e8-b404-37b7060746c8 new file mode 100644 index 0000000..c5b38cc --- /dev/null +++ b/static/graphs/2a410eea-a9da-11e8-b404-37b7060746c8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"microsoft-activity-group=https://www.cfr.org/interactive/cyber-operations/mythic-leopard" [label="microsoft-activity-group\nhttps://www.cfr.org/interactive/cyber-operations/mythic-leopard",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=https://www.cfr.org/interactive/cyber-operations/mythic-leopard" -> "threat-actor=Operation C-Major" [label="similar",dir="both"];"threat-actor=Operation C-Major" [label="threat-actor\nOperation C-Major",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/2a410eea-a9da-11e8-b404-37b7060746c8.png b/static/graphs/2a410eea-a9da-11e8-b404-37b7060746c8.png new file mode 100644 index 0000000..c296265 Binary files /dev/null and b/static/graphs/2a410eea-a9da-11e8-b404-37b7060746c8.png differ diff --git a/static/graphs/2a6f4c7b-e690-4cc7-ab6b-1f821fb6b80b b/static/graphs/2a6f4c7b-e690-4cc7-ab6b-1f821fb6b80b new file mode 100644 index 0000000..9633ba5 --- /dev/null +++ b/static/graphs/2a6f4c7b-e690-4cc7-ab6b-1f821fb6b80b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=LOWBALL - S0042" [label="mitre-enterprise-attack-malware\nLOWBALL - S0042",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=LOWBALL - S0042" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/2a6f4c7b-e690-4cc7-ab6b-1f821fb6b80b.png b/static/graphs/2a6f4c7b-e690-4cc7-ab6b-1f821fb6b80b.png new file mode 100644 index 0000000..308aba3 Binary files /dev/null and b/static/graphs/2a6f4c7b-e690-4cc7-ab6b-1f821fb6b80b.png differ diff --git a/static/graphs/2a70812b-f1ef-44db-8578-a496a227aef2 b/static/graphs/2a70812b-f1ef-44db-8578-a496a227aef2 new file mode 100644 index 0000000..efe19d1 --- /dev/null +++ b/static/graphs/2a70812b-f1ef-44db-8578-a496a227aef2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=NETWIRE - S0198" [label="mitre-enterprise-attack-malware\nNETWIRE - S0198",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=NETWIRE - S0198" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];} diff --git a/static/graphs/2a70812b-f1ef-44db-8578-a496a227aef2.png b/static/graphs/2a70812b-f1ef-44db-8578-a496a227aef2.png new file mode 100644 index 0000000..9b8bed0 Binary files /dev/null and b/static/graphs/2a70812b-f1ef-44db-8578-a496a227aef2.png differ diff --git a/static/graphs/2a7914cf-dff3-428d-ab0f-1014d1c28aeb b/static/graphs/2a7914cf-dff3-428d-ab0f-1014d1c28aeb new file mode 100644 index 0000000..248e2c9 --- /dev/null +++ b/static/graphs/2a7914cf-dff3-428d-ab0f-1014d1c28aeb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=FIN6 - G0037" [label="mitre-enterprise-attack-intrusion-set\nFIN6 - G0037",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=FIN6 - G0037" -> "threat-actor=FIN6" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=FIN6 - G0037" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];"threat-actor=FIN6" [label="threat-actor\nFIN6",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/2a7914cf-dff3-428d-ab0f-1014d1c28aeb.png b/static/graphs/2a7914cf-dff3-428d-ab0f-1014d1c28aeb.png new file mode 100644 index 0000000..177b8c3 Binary files /dev/null and b/static/graphs/2a7914cf-dff3-428d-ab0f-1014d1c28aeb.png differ diff --git a/static/graphs/2a838144-b42d-4c12-bf41-4e99de1935e9 b/static/graphs/2a838144-b42d-4c12-bf41-4e99de1935e9 new file mode 100644 index 0000000..bd49fbe --- /dev/null +++ b/static/graphs/2a838144-b42d-4c12-bf41-4e99de1935e9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Vatet" [label="tool\nVatet",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/2a838144-b42d-4c12-bf41-4e99de1935e9.png b/static/graphs/2a838144-b42d-4c12-bf41-4e99de1935e9.png new file mode 100644 index 0000000..1c1d95f Binary files /dev/null and b/static/graphs/2a838144-b42d-4c12-bf41-4e99de1935e9.png differ diff --git a/static/graphs/2a8de25c-f743-4348-b101-3ee33ab5871b b/static/graphs/2a8de25c-f743-4348-b101-3ee33ab5871b new file mode 100644 index 0000000..69e99c0 --- /dev/null +++ b/static/graphs/2a8de25c-f743-4348-b101-3ee33ab5871b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Data Encrypted Mitigation - T1022" [label="mitre-enterprise-attack-course-of-action\nData Encrypted Mitigation - T1022",shape=ellipse];"mitre-enterprise-attack-course-of-action=Data Encrypted Mitigation - T1022" -> "mitre-enterprise-attack-attack-pattern=Data Encrypted - T1022" [label="mitigates",];} diff --git a/static/graphs/2a8de25c-f743-4348-b101-3ee33ab5871b.png b/static/graphs/2a8de25c-f743-4348-b101-3ee33ab5871b.png new file mode 100644 index 0000000..f9eb377 Binary files /dev/null and b/static/graphs/2a8de25c-f743-4348-b101-3ee33ab5871b.png differ diff --git a/static/graphs/2abe89de-46dd-4dae-ae22-b49a593aff54 b/static/graphs/2abe89de-46dd-4dae-ae22-b49a593aff54 new file mode 100644 index 0000000..b650003 --- /dev/null +++ b/static/graphs/2abe89de-46dd-4dae-ae22-b49a593aff54 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Poison Ivy" -> "rat=PoisonIvy" [label="similar",dir="both"];"tool=Poison Ivy" -> "mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="similar",dir="both"];"tool=Poison Ivy" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"tool=Poison Ivy" -> "tool=poisonivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];} diff --git a/static/graphs/2abe89de-46dd-4dae-ae22-b49a593aff54.png b/static/graphs/2abe89de-46dd-4dae-ae22-b49a593aff54.png new file mode 100644 index 0000000..571df1f Binary files /dev/null and b/static/graphs/2abe89de-46dd-4dae-ae22-b49a593aff54.png differ diff --git a/static/graphs/2ace01f8-67c8-43eb-b7b1-a7b9f1fe67e1 b/static/graphs/2ace01f8-67c8-43eb-b7b1-a7b9f1fe67e1 new file mode 100644 index 0000000..26240d0 --- /dev/null +++ b/static/graphs/2ace01f8-67c8-43eb-b7b1-a7b9f1fe67e1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=File and Directory Discovery Mitigation - T1083" [label="mitre-enterprise-attack-course-of-action\nFile and Directory Discovery Mitigation - T1083",shape=ellipse];"mitre-enterprise-attack-course-of-action=File and Directory Discovery Mitigation - T1083" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="mitigates",];} diff --git a/static/graphs/2ace01f8-67c8-43eb-b7b1-a7b9f1fe67e1.png b/static/graphs/2ace01f8-67c8-43eb-b7b1-a7b9f1fe67e1.png new file mode 100644 index 0000000..b344490 Binary files /dev/null and b/static/graphs/2ace01f8-67c8-43eb-b7b1-a7b9f1fe67e1.png differ diff --git a/static/graphs/2b9a666e-bd59-4f67-9031-ed41b428e04a b/static/graphs/2b9a666e-bd59-4f67-9031-ed41b428e04a new file mode 100644 index 0000000..c67d71c --- /dev/null +++ b/static/graphs/2b9a666e-bd59-4f67-9031-ed41b428e04a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" [label="mitre-pre-attack-attack-pattern\nAcquire OSINT data sets and information - PRE-T1043",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" -> "mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1054" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" -> "mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1024" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1054" [label="mitre-pre-attack-attack-pattern\nAcquire OSINT data sets and information - PRE-T1054",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1054" -> "mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1024" [label="mitre-pre-attack-attack-pattern\nAcquire OSINT data sets and information - PRE-T1024",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1024" -> "mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" [label="related-to",];} diff --git a/static/graphs/2b9a666e-bd59-4f67-9031-ed41b428e04a.png b/static/graphs/2b9a666e-bd59-4f67-9031-ed41b428e04a.png new file mode 100644 index 0000000..c173dcb Binary files /dev/null and b/static/graphs/2b9a666e-bd59-4f67-9031-ed41b428e04a.png differ diff --git a/static/graphs/2be434d3-03df-4236-9e7e-130c2efa8b33 b/static/graphs/2be434d3-03df-4236-9e7e-130c2efa8b33 new file mode 100644 index 0000000..4bda9c8 --- /dev/null +++ b/static/graphs/2be434d3-03df-4236-9e7e-130c2efa8b33 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Net Devil" [label="rat\nNet Devil",shape=box,style=filled,color=deepskyblue];"rat=Net Devil" -> "rat=NetDevil" [label="similar",dir="both"];"rat=NetDevil" [label="rat\nNetDevil",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/2be434d3-03df-4236-9e7e-130c2efa8b33.png b/static/graphs/2be434d3-03df-4236-9e7e-130c2efa8b33.png new file mode 100644 index 0000000..b671e31 Binary files /dev/null and b/static/graphs/2be434d3-03df-4236-9e7e-130c2efa8b33.png differ diff --git a/static/graphs/2c3ce852-06a2-40ee-8fe6-086f6402a739 b/static/graphs/2c3ce852-06a2-40ee-8fe6-086f6402a739 new file mode 100644 index 0000000..3337a7f --- /dev/null +++ b/static/graphs/2c3ce852-06a2-40ee-8fe6-086f6402a739 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Hypervisor Mitigation - T1062" [label="mitre-enterprise-attack-course-of-action\nHypervisor Mitigation - T1062",shape=ellipse];"mitre-enterprise-attack-course-of-action=Hypervisor Mitigation - T1062" -> "mitre-enterprise-attack-attack-pattern=Hypervisor - T1062" [label="mitigates",];} diff --git a/static/graphs/2c3ce852-06a2-40ee-8fe6-086f6402a739.png b/static/graphs/2c3ce852-06a2-40ee-8fe6-086f6402a739.png new file mode 100644 index 0000000..5306dca Binary files /dev/null and b/static/graphs/2c3ce852-06a2-40ee-8fe6-086f6402a739.png differ diff --git a/static/graphs/2c62f08a-9bd9-11e8-9e20-db9ec0d2b277 b/static/graphs/2c62f08a-9bd9-11e8-9e20-db9ec0d2b277 new file mode 100644 index 0000000..7fa08b0 --- /dev/null +++ b/static/graphs/2c62f08a-9bd9-11e8-9e20-db9ec0d2b277 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=reGeorg" [label="tool\nreGeorg",shape=box,style=filled,color=deepskyblue];"tool=reGeorg" -> "malpedia=reGeorg" [label="similar",dir="both"];} diff --git a/static/graphs/2c62f08a-9bd9-11e8-9e20-db9ec0d2b277.png b/static/graphs/2c62f08a-9bd9-11e8-9e20-db9ec0d2b277.png new file mode 100644 index 0000000..e7c6faa Binary files /dev/null and b/static/graphs/2c62f08a-9bd9-11e8-9e20-db9ec0d2b277.png differ diff --git a/static/graphs/2d1aadfb-03c1-4580-b6ac-f12c6941067d b/static/graphs/2d1aadfb-03c1-4580-b6ac-f12c6941067d new file mode 100644 index 0000000..3fb1ea5 --- /dev/null +++ b/static/graphs/2d1aadfb-03c1-4580-b6ac-f12c6941067d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Quant Loader" [label="tool\nQuant Loader",shape=box,style=filled,color=deepskyblue];"tool=Quant Loader" -> "malpedia=QuantLoader" [label="similar",dir="both"];} diff --git a/static/graphs/2d1aadfb-03c1-4580-b6ac-f12c6941067d.png b/static/graphs/2d1aadfb-03c1-4580-b6ac-f12c6941067d.png new file mode 100644 index 0000000..732c955 Binary files /dev/null and b/static/graphs/2d1aadfb-03c1-4580-b6ac-f12c6941067d.png differ diff --git a/static/graphs/2d704e56-e689-4011-b989-bf4e025a8727 b/static/graphs/2d704e56-e689-4011-b989-bf4e025a8727 new file mode 100644 index 0000000..1d8b945 --- /dev/null +++ b/static/graphs/2d704e56-e689-4011-b989-bf4e025a8727 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Plist Modification Mitigation - T1150" [label="mitre-enterprise-attack-course-of-action\nPlist Modification Mitigation - T1150",shape=ellipse];"mitre-enterprise-attack-course-of-action=Plist Modification Mitigation - T1150" -> "mitre-enterprise-attack-attack-pattern=Plist Modification - T1150" [label="mitigates",];} diff --git a/static/graphs/2d704e56-e689-4011-b989-bf4e025a8727.png b/static/graphs/2d704e56-e689-4011-b989-bf4e025a8727.png new file mode 100644 index 0000000..294fc1b Binary files /dev/null and b/static/graphs/2d704e56-e689-4011-b989-bf4e025a8727.png differ diff --git a/static/graphs/2daa14d6-cbf3-4308-bb8e-213c324a08e4 b/static/graphs/2daa14d6-cbf3-4308-bb8e-213c324a08e4 new file mode 100644 index 0000000..4d1f7ce --- /dev/null +++ b/static/graphs/2daa14d6-cbf3-4308-bb8e-213c324a08e4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=HAMMERTOSS - S0037" [label="mitre-enterprise-attack-malware\nHAMMERTOSS - S0037",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=HAMMERTOSS - S0037" -> "mitre-enterprise-attack-attack-pattern=Custom Cryptographic Protocol - T1024" [label="uses",];} diff --git a/static/graphs/2daa14d6-cbf3-4308-bb8e-213c324a08e4.png b/static/graphs/2daa14d6-cbf3-4308-bb8e-213c324a08e4.png new file mode 100644 index 0000000..4f74b17 Binary files /dev/null and b/static/graphs/2daa14d6-cbf3-4308-bb8e-213c324a08e4.png differ diff --git a/static/graphs/2dd34b01-6110-4aac-835d-b5e7b936b0be b/static/graphs/2dd34b01-6110-4aac-835d-b5e7b936b0be new file mode 100644 index 0000000..758c01f --- /dev/null +++ b/static/graphs/2dd34b01-6110-4aac-835d-b5e7b936b0be @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=OLDBAIT - S0138" [label="mitre-enterprise-attack-malware\nOLDBAIT - S0138",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=OLDBAIT - S0138" -> "tool=OLDBAIT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=OLDBAIT - S0138" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"tool=OLDBAIT" [label="tool\nOLDBAIT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/2dd34b01-6110-4aac-835d-b5e7b936b0be.png b/static/graphs/2dd34b01-6110-4aac-835d-b5e7b936b0be.png new file mode 100644 index 0000000..d943f74 Binary files /dev/null and b/static/graphs/2dd34b01-6110-4aac-835d-b5e7b936b0be.png differ diff --git a/static/graphs/2e290bfe-93b5-48ce-97d6-edcd6d32b7cf b/static/graphs/2e290bfe-93b5-48ce-97d6-edcd6d32b7cf new file mode 100644 index 0000000..d9490cf --- /dev/null +++ b/static/graphs/2e290bfe-93b5-48ce-97d6-edcd6d32b7cf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Gamaredon Group - G0047" [label="mitre-enterprise-attack-intrusion-set\nGamaredon Group - G0047",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Gamaredon Group - G0047" -> "threat-actor=Gamaredon Group" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Gamaredon Group - G0047" -> "mitre-enterprise-attack-attack-pattern=Scripting - T1064" [label="uses",];"threat-actor=Gamaredon Group" [label="threat-actor\nGamaredon Group",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/2e290bfe-93b5-48ce-97d6-edcd6d32b7cf.png b/static/graphs/2e290bfe-93b5-48ce-97d6-edcd6d32b7cf.png new file mode 100644 index 0000000..81ff55f Binary files /dev/null and b/static/graphs/2e290bfe-93b5-48ce-97d6-edcd6d32b7cf.png differ diff --git a/static/graphs/2e45723a-31da-4a7e-aaa6-e01998a6788f b/static/graphs/2e45723a-31da-4a7e-aaa6-e01998a6788f new file mode 100644 index 0000000..02eb54d --- /dev/null +++ b/static/graphs/2e45723a-31da-4a7e-aaa6-e01998a6788f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Tasklist - S0057" [label="mitre-enterprise-attack-tool\nTasklist - S0057",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Tasklist - S0057" -> "mitre-enterprise-attack-attack-pattern=System Service Discovery - T1007" [label="uses",];} diff --git a/static/graphs/2e45723a-31da-4a7e-aaa6-e01998a6788f.png b/static/graphs/2e45723a-31da-4a7e-aaa6-e01998a6788f.png new file mode 100644 index 0000000..7dd8084 Binary files /dev/null and b/static/graphs/2e45723a-31da-4a7e-aaa6-e01998a6788f.png differ diff --git a/static/graphs/2e5d3a83-fe00-41a5-9b60-237efc84832f b/static/graphs/2e5d3a83-fe00-41a5-9b60-237efc84832f new file mode 100644 index 0000000..7e91b54 --- /dev/null +++ b/static/graphs/2e5d3a83-fe00-41a5-9b60-237efc84832f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Moafee - G0002" [label="mitre-enterprise-attack-intrusion-set\nMoafee - G0002",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Moafee - G0002" -> "threat-actor=DragonOK" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Moafee - G0002" -> "mitre-enterprise-attack-intrusion-set=DragonOK - G0017" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Moafee - G0002" -> "mitre-enterprise-attack-attack-pattern=Binary Padding - T1009" [label="uses",];"mitre-enterprise-attack-intrusion-set=DragonOK - G0017" [label="mitre-enterprise-attack-intrusion-set\nDragonOK - G0017",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=DragonOK - G0017" -> "mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="uses",];"threat-actor=DragonOK" [label="threat-actor\nDragonOK",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "rat=PoisonIvy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "tool=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "tool=poisonivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];} diff --git a/static/graphs/2e5d3a83-fe00-41a5-9b60-237efc84832f.png b/static/graphs/2e5d3a83-fe00-41a5-9b60-237efc84832f.png new file mode 100644 index 0000000..43971fe Binary files /dev/null and b/static/graphs/2e5d3a83-fe00-41a5-9b60-237efc84832f.png differ diff --git a/static/graphs/2ea1f494-cf18-49fb-a043-36555131dd7c b/static/graphs/2ea1f494-cf18-49fb-a043-36555131dd7c new file mode 100644 index 0000000..40997c4 --- /dev/null +++ b/static/graphs/2ea1f494-cf18-49fb-a043-36555131dd7c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=BlackHole" [label="rat\nBlackHole",shape=box,style=filled,color=deepskyblue];"rat=BlackHole" -> "exploit-kit=BlackHole" [label="similar",dir="both"];"exploit-kit=BlackHole" [label="exploit-kit\nBlackHole",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/2ea1f494-cf18-49fb-a043-36555131dd7c.png b/static/graphs/2ea1f494-cf18-49fb-a043-36555131dd7c.png new file mode 100644 index 0000000..e585a58 Binary files /dev/null and b/static/graphs/2ea1f494-cf18-49fb-a043-36555131dd7c.png differ diff --git a/static/graphs/2eb658ed-aff4-4253-a21f-9059b133ce17 b/static/graphs/2eb658ed-aff4-4253-a21f-9059b133ce17 new file mode 100644 index 0000000..86989d1 --- /dev/null +++ b/static/graphs/2eb658ed-aff4-4253-a21f-9059b133ce17 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Zloader Zeus" [label="banker\nZloader Zeus",shape=box,style=filled,color=deepskyblue];"banker=Zloader Zeus" -> "malpedia=Zloader" [label="similar",dir="both"];} diff --git a/static/graphs/2eb658ed-aff4-4253-a21f-9059b133ce17.png b/static/graphs/2eb658ed-aff4-4253-a21f-9059b133ce17.png new file mode 100644 index 0000000..777cd64 Binary files /dev/null and b/static/graphs/2eb658ed-aff4-4253-a21f-9059b133ce17.png differ diff --git a/static/graphs/2eb9b131-d333-4a48-9eb4-d8dec46c19ee b/static/graphs/2eb9b131-d333-4a48-9eb4-d8dec46c19ee new file mode 100644 index 0000000..707aaa4 --- /dev/null +++ b/static/graphs/2eb9b131-d333-4a48-9eb4-d8dec46c19ee @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=CosmicDuke - S0050" [label="mitre-enterprise-attack-malware\nCosmicDuke - S0050",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CosmicDuke - S0050" -> "mitre-enterprise-attack-attack-pattern=Data from Network Shared Drive - T1039" [label="uses",];} diff --git a/static/graphs/2eb9b131-d333-4a48-9eb4-d8dec46c19ee.png b/static/graphs/2eb9b131-d333-4a48-9eb4-d8dec46c19ee.png new file mode 100644 index 0000000..dacae16 Binary files /dev/null and b/static/graphs/2eb9b131-d333-4a48-9eb4-d8dec46c19ee.png differ diff --git a/static/graphs/2ee5ed7a-c4d0-40be-a837-20817474a15b b/static/graphs/2ee5ed7a-c4d0-40be-a837-20817474a15b new file mode 100644 index 0000000..48c6d8c --- /dev/null +++ b/static/graphs/2ee5ed7a-c4d0-40be-a837-20817474a15b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=UNC2452" [label="threat-actor\nUNC2452",shape=octagon,style=filled,color=indianred1];"threat-actor=UNC2452" -> "microsoft-activity-group=NOBELIUM" [label="similar",dir="both"];"microsoft-activity-group=NOBELIUM" [label="microsoft-activity-group\nNOBELIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=NOBELIUM" -> "backdoor=SUNBURST" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=TEARDROP" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=GoldMax" [label="uses",];"backdoor=SUNBURST" [label="backdoor\nSUNBURST",shape=box,style=filled,color=deepskyblue];"backdoor=SUNBURST" -> "tool=SUNSPOT" [label="dropped-by",];"backdoor=SUNBURST" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=TEARDROP" [label="tool\nTEARDROP",shape=box,style=filled,color=deepskyblue];"tool=TEARDROP" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=TEARDROP" -> "tool=Raindrop" [label="variant-of",];"tool=GoldMax" [label="tool\nGoldMax",shape=box,style=filled,color=deepskyblue];"tool=GoldMax" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=SUNSPOT" [label="tool\nSUNSPOT",shape=box,style=filled,color=deepskyblue];"tool=SUNSPOT" -> "backdoor=SUNBURST" [label="dropped",];"tool=Raindrop" [label="tool\nRaindrop",shape=box,style=filled,color=deepskyblue];"tool=Raindrop" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=Raindrop" -> "tool=TEARDROP" [label="variant-of",];} diff --git a/static/graphs/2ee5ed7a-c4d0-40be-a837-20817474a15b.png b/static/graphs/2ee5ed7a-c4d0-40be-a837-20817474a15b.png new file mode 100644 index 0000000..50dcb38 Binary files /dev/null and b/static/graphs/2ee5ed7a-c4d0-40be-a837-20817474a15b.png differ diff --git a/static/graphs/2f1a9fd0-3b7c-4d77-a358-78db13adbe78 b/static/graphs/2f1a9fd0-3b7c-4d77-a358-78db13adbe78 new file mode 100644 index 0000000..8bb6fd8 --- /dev/null +++ b/static/graphs/2f1a9fd0-3b7c-4d77-a358-78db13adbe78 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=EvilGrab - S0152" [label="mitre-enterprise-attack-malware\nEvilGrab - S0152",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=EvilGrab - S0152" -> "tool=EvilGrab" [label="similar",dir="both"];"mitre-enterprise-attack-malware=EvilGrab - S0152" -> "malpedia=EvilGrab" [label="similar",dir="both"];"mitre-enterprise-attack-malware=EvilGrab - S0152" -> "mitre-enterprise-attack-attack-pattern=Commonly Used Port - T1043" [label="uses",];"tool=EvilGrab" [label="tool\nEvilGrab",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/2f1a9fd0-3b7c-4d77-a358-78db13adbe78.png b/static/graphs/2f1a9fd0-3b7c-4d77-a358-78db13adbe78.png new file mode 100644 index 0000000..88eb42a Binary files /dev/null and b/static/graphs/2f1a9fd0-3b7c-4d77-a358-78db13adbe78.png differ diff --git a/static/graphs/2f1fd017-9df6-4759-91fb-e7039609b5ff b/static/graphs/2f1fd017-9df6-4759-91fb-e7039609b5ff new file mode 100644 index 0000000..5490677 --- /dev/null +++ b/static/graphs/2f1fd017-9df6-4759-91fb-e7039609b5ff @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Naikon" [label="threat-actor\nNaikon",shape=octagon,style=filled,color=indianred1];"threat-actor=Naikon" -> "mitre-enterprise-attack-intrusion-set=Naikon - G0019" [label="similar",dir="both"];"threat-actor=Naikon" -> "threat-actor=Lotus Panda" [label="similar",dir="both"];"threat-actor=Naikon" -> "threat-actor=APT 30" [label="similar",dir="both"];"threat-actor=Naikon" -> "mitre-enterprise-attack-intrusion-set=APT30 - G0013" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" [label="mitre-enterprise-attack-intrusion-set\nNaikon - G0019",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" -> "mitre-enterprise-attack-tool=netsh - S0108" [label="uses",];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" [label="mitre-enterprise-attack-intrusion-set\nAPT30 - G0013",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" -> "mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="uses",];"threat-actor=Lotus Panda" [label="threat-actor\nLotus Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=APT 30" [label="threat-actor\nAPT 30",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="mitre-enterprise-attack-malware\nBACKSPACE - S0031",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "tool=Backspace" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Command and Control Channel - T1041" [label="uses",];"mitre-enterprise-attack-tool=netsh - S0108" [label="mitre-enterprise-attack-tool\nnetsh - S0108",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=netsh - S0108" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="uses",];"tool=Backspace" [label="tool\nBackspace",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/2f1fd017-9df6-4759-91fb-e7039609b5ff.png b/static/graphs/2f1fd017-9df6-4759-91fb-e7039609b5ff.png new file mode 100644 index 0000000..8bb124d Binary files /dev/null and b/static/graphs/2f1fd017-9df6-4759-91fb-e7039609b5ff.png differ diff --git a/static/graphs/2f3311cd-8476-4be7-9005-ead920afc781 b/static/graphs/2f3311cd-8476-4be7-9005-ead920afc781 new file mode 100644 index 0000000..aafdd1c --- /dev/null +++ b/static/graphs/2f3311cd-8476-4be7-9005-ead920afc781 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Longhorn" [label="threat-actor\nLonghorn",shape=octagon,style=filled,color=indianred1];"threat-actor=Longhorn" -> "threat-actor=Equation Group" [label="similar",dir="both"];"threat-actor=Equation Group" [label="threat-actor\nEquation Group",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/2f3311cd-8476-4be7-9005-ead920afc781.png b/static/graphs/2f3311cd-8476-4be7-9005-ead920afc781.png new file mode 100644 index 0000000..c6e54be Binary files /dev/null and b/static/graphs/2f3311cd-8476-4be7-9005-ead920afc781.png differ diff --git a/static/graphs/2fab555f-7664-4623-b4e0-1675ae38190b b/static/graphs/2fab555f-7664-4623-b4e0-1675ae38190b new file mode 100644 index 0000000..6e89a4b --- /dev/null +++ b/static/graphs/2fab555f-7664-4623-b4e0-1675ae38190b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Lslsass - S0121" [label="mitre-enterprise-attack-tool\nLslsass - S0121",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Lslsass - S0121" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];} diff --git a/static/graphs/2fab555f-7664-4623-b4e0-1675ae38190b.png b/static/graphs/2fab555f-7664-4623-b4e0-1675ae38190b.png new file mode 100644 index 0000000..813b30f Binary files /dev/null and b/static/graphs/2fab555f-7664-4623-b4e0-1675ae38190b.png differ diff --git a/static/graphs/2fafe8b2-b0db-11e8-a81e-4b62ee50bd87 b/static/graphs/2fafe8b2-b0db-11e8-a81e-4b62ee50bd87 new file mode 100644 index 0000000..e471f7b --- /dev/null +++ b/static/graphs/2fafe8b2-b0db-11e8-a81e-4b62ee50bd87 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=CamuBot" [label="banker\nCamuBot",shape=box,style=filled,color=deepskyblue];"banker=CamuBot" -> "malpedia=CamuBot" [label="similar",dir="both"];} diff --git a/static/graphs/2fafe8b2-b0db-11e8-a81e-4b62ee50bd87.png b/static/graphs/2fafe8b2-b0db-11e8-a81e-4b62ee50bd87.png new file mode 100644 index 0000000..a01ec7e Binary files /dev/null and b/static/graphs/2fafe8b2-b0db-11e8-a81e-4b62ee50bd87.png differ diff --git a/static/graphs/2fb07fa4-0d7f-43c7-8ff4-b28404313fe7 b/static/graphs/2fb07fa4-0d7f-43c7-8ff4-b28404313fe7 new file mode 100644 index 0000000..0095c3c --- /dev/null +++ b/static/graphs/2fb07fa4-0d7f-43c7-8ff4-b28404313fe7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Samurai Panda" [label="threat-actor\nSamurai Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Samurai Panda" -> "mitre-enterprise-attack-intrusion-set=APT18 - G0026" [label="similar",dir="both"];"threat-actor=Samurai Panda" -> "threat-actor=Wekby" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT18 - G0026" [label="mitre-enterprise-attack-intrusion-set\nAPT18 - G0026",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT18 - G0026" -> "threat-actor=Maverick Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT18 - G0026" -> "mitre-enterprise-attack-attack-pattern=File Deletion - T1107" [label="uses",];"threat-actor=Wekby" [label="threat-actor\nWekby",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/2fb07fa4-0d7f-43c7-8ff4-b28404313fe7.png b/static/graphs/2fb07fa4-0d7f-43c7-8ff4-b28404313fe7.png new file mode 100644 index 0000000..14b4e49 Binary files /dev/null and b/static/graphs/2fb07fa4-0d7f-43c7-8ff4-b28404313fe7.png differ diff --git a/static/graphs/2fb26586-2b53-4b9a-ad4f-2b3bcb9a2421 b/static/graphs/2fb26586-2b53-4b9a-ad4f-2b3bcb9a2421 new file mode 100644 index 0000000..1b4b977 --- /dev/null +++ b/static/graphs/2fb26586-2b53-4b9a-ad4f-2b3bcb9a2421 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=SslMM - S0058" [label="mitre-enterprise-attack-malware\nSslMM - S0058",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SslMM - S0058" -> "malpedia=SslMM" [label="similar",dir="both"];"mitre-enterprise-attack-malware=SslMM - S0058" -> "mitre-enterprise-attack-attack-pattern=System Information Discovery - T1082" [label="uses",];} diff --git a/static/graphs/2fb26586-2b53-4b9a-ad4f-2b3bcb9a2421.png b/static/graphs/2fb26586-2b53-4b9a-ad4f-2b3bcb9a2421.png new file mode 100644 index 0000000..353fcf9 Binary files /dev/null and b/static/graphs/2fb26586-2b53-4b9a-ad4f-2b3bcb9a2421.png differ diff --git a/static/graphs/2fb307a2-8752-4521-8973-75b68703030d b/static/graphs/2fb307a2-8752-4521-8973-75b68703030d new file mode 100644 index 0000000..9e3d9d4 --- /dev/null +++ b/static/graphs/2fb307a2-8752-4521-8973-75b68703030d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoJoker" [label="ransomware\nCryptoJoker",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoJoker" -> "ransomware=CryptoNar" [label="similar",dir="both"];"ransomware=CryptoNar" [label="ransomware\nCryptoNar",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/2fb307a2-8752-4521-8973-75b68703030d.png b/static/graphs/2fb307a2-8752-4521-8973-75b68703030d.png new file mode 100644 index 0000000..3228cb1 Binary files /dev/null and b/static/graphs/2fb307a2-8752-4521-8973-75b68703030d.png differ diff --git a/static/graphs/2fec3512-9782-4b3b-a880-30fda4641858 b/static/graphs/2fec3512-9782-4b3b-a880-30fda4641858 new file mode 100644 index 0000000..2b3bebd --- /dev/null +++ b/static/graphs/2fec3512-9782-4b3b-a880-30fda4641858 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Backup" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/2fec3512-9782-4b3b-a880-30fda4641858.png b/static/graphs/2fec3512-9782-4b3b-a880-30fda4641858.png new file mode 100644 index 0000000..cc7ae69 Binary files /dev/null and b/static/graphs/2fec3512-9782-4b3b-a880-30fda4641858.png differ diff --git a/static/graphs/30489451-5886-4c46-90c9-0dff9adc5252 b/static/graphs/30489451-5886-4c46-90c9-0dff9adc5252 new file mode 100644 index 0000000..bc40cfa --- /dev/null +++ b/static/graphs/30489451-5886-4c46-90c9-0dff9adc5252 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Arp - S0099" [label="mitre-enterprise-attack-tool\nArp - S0099",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Arp - S0099" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];} diff --git a/static/graphs/30489451-5886-4c46-90c9-0dff9adc5252.png b/static/graphs/30489451-5886-4c46-90c9-0dff9adc5252.png new file mode 100644 index 0000000..b1cd204 Binary files /dev/null and b/static/graphs/30489451-5886-4c46-90c9-0dff9adc5252.png differ diff --git a/static/graphs/304fd753-c917-4008-8f85-81390c37a070 b/static/graphs/304fd753-c917-4008-8f85-81390c37a070 new file mode 100644 index 0000000..349e2af --- /dev/null +++ b/static/graphs/304fd753-c917-4008-8f85-81390c37a070 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Silence" [label="tool\nSilence",shape=box,style=filled,color=deepskyblue];"tool=Silence" -> "malpedia=Silence" [label="similar",dir="both"];} diff --git a/static/graphs/304fd753-c917-4008-8f85-81390c37a070.png b/static/graphs/304fd753-c917-4008-8f85-81390c37a070.png new file mode 100644 index 0000000..4940f83 Binary files /dev/null and b/static/graphs/304fd753-c917-4008-8f85-81390c37a070.png differ diff --git a/static/graphs/308855d1-078b-47ad-8d2a-8f9b2713ffb5 b/static/graphs/308855d1-078b-47ad-8d2a-8f9b2713ffb5 new file mode 100644 index 0000000..151b210 --- /dev/null +++ b/static/graphs/308855d1-078b-47ad-8d2a-8f9b2713ffb5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Windows Admin Shares Mitigation - T1077" [label="mitre-enterprise-attack-course-of-action\nWindows Admin Shares Mitigation - T1077",shape=ellipse];"mitre-enterprise-attack-course-of-action=Windows Admin Shares Mitigation - T1077" -> "mitre-enterprise-attack-attack-pattern=Windows Admin Shares - T1077" [label="mitigates",];} diff --git a/static/graphs/308855d1-078b-47ad-8d2a-8f9b2713ffb5.png b/static/graphs/308855d1-078b-47ad-8d2a-8f9b2713ffb5.png new file mode 100644 index 0000000..502bba5 Binary files /dev/null and b/static/graphs/308855d1-078b-47ad-8d2a-8f9b2713ffb5.png differ diff --git a/static/graphs/310f437b-29e7-4844-848c-7220868d074a b/static/graphs/310f437b-29e7-4844-848c-7220868d074a new file mode 100644 index 0000000..6f7b278 --- /dev/null +++ b/static/graphs/310f437b-29e7-4844-848c-7220868d074a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Darkmoon - S0209" [label="mitre-enterprise-attack-malware\nDarkmoon - S0209",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Darkmoon - S0209" -> "malpedia=Darkmoon" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Darkmoon - S0209" -> "mitre-enterprise-attack-attack-pattern=Modify Registry - T1112" [label="uses",];} diff --git a/static/graphs/310f437b-29e7-4844-848c-7220868d074a.png b/static/graphs/310f437b-29e7-4844-848c-7220868d074a.png new file mode 100644 index 0000000..760bdb1 Binary files /dev/null and b/static/graphs/310f437b-29e7-4844-848c-7220868d074a.png differ diff --git a/static/graphs/312c93ae-9405-445b-be11-2d0e4aec4f84 b/static/graphs/312c93ae-9405-445b-be11-2d0e4aec4f84 new file mode 100644 index 0000000..6b15893 --- /dev/null +++ b/static/graphs/312c93ae-9405-445b-be11-2d0e4aec4f84 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Pirate" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/312c93ae-9405-445b-be11-2d0e4aec4f84.png b/static/graphs/312c93ae-9405-445b-be11-2d0e4aec4f84.png new file mode 100644 index 0000000..9e97954 Binary files /dev/null and b/static/graphs/312c93ae-9405-445b-be11-2d0e4aec4f84.png differ diff --git a/static/graphs/313c8b20-4d49-40c1-9ac0-4c573aca28f3 b/static/graphs/313c8b20-4d49-40c1-9ac0-4c573aca28f3 new file mode 100644 index 0000000..7121972 --- /dev/null +++ b/static/graphs/313c8b20-4d49-40c1-9ac0-4c573aca28f3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Winlogon Helper DLL Mitigation - T1004" [label="mitre-enterprise-attack-course-of-action\nWinlogon Helper DLL Mitigation - T1004",shape=ellipse];"mitre-enterprise-attack-course-of-action=Winlogon Helper DLL Mitigation - T1004" -> "mitre-enterprise-attack-attack-pattern=Winlogon Helper DLL - T1004" [label="mitigates",];} diff --git a/static/graphs/313c8b20-4d49-40c1-9ac0-4c573aca28f3.png b/static/graphs/313c8b20-4d49-40c1-9ac0-4c573aca28f3.png new file mode 100644 index 0000000..787931b Binary files /dev/null and b/static/graphs/313c8b20-4d49-40c1-9ac0-4c573aca28f3.png differ diff --git a/static/graphs/317a2c10-d489-431e-b6b2-f0251fddc88e b/static/graphs/317a2c10-d489-431e-b6b2-f0251fddc88e new file mode 100644 index 0000000..4d2b38b --- /dev/null +++ b/static/graphs/317a2c10-d489-431e-b6b2-f0251fddc88e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=Dendroid - MOB-S0017" [label="mitre-mobile-attack-malware\nDendroid - MOB-S0017",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Dendroid - MOB-S0017" -> "rat=Dendroid" [label="similar",dir="both"];"mitre-mobile-attack-malware=Dendroid - MOB-S0017" -> "mitre-mobile-attack-attack-pattern=Microphone or Camera Recordings - MOB-T1032" [label="uses",];"rat=Dendroid" [label="rat\nDendroid",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/317a2c10-d489-431e-b6b2-f0251fddc88e.png b/static/graphs/317a2c10-d489-431e-b6b2-f0251fddc88e.png new file mode 100644 index 0000000..3cffd73 Binary files /dev/null and b/static/graphs/317a2c10-d489-431e-b6b2-f0251fddc88e.png differ diff --git a/static/graphs/31945e7b-a734-4333-9ea2-e52051ca015a b/static/graphs/31945e7b-a734-4333-9ea2-e52051ca015a new file mode 100644 index 0000000..8ee439f --- /dev/null +++ b/static/graphs/31945e7b-a734-4333-9ea2-e52051ca015a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=WildFire Locker" [label="ransomware\nWildFire Locker",shape=box,style=filled,color=deepskyblue];"ransomware=WildFire Locker" -> "ransomware=Hades" [label="similar",dir="both"];"ransomware=Hades" [label="ransomware\nHades",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/31945e7b-a734-4333-9ea2-e52051ca015a.png b/static/graphs/31945e7b-a734-4333-9ea2-e52051ca015a.png new file mode 100644 index 0000000..c50ead6 Binary files /dev/null and b/static/graphs/31945e7b-a734-4333-9ea2-e52051ca015a.png differ diff --git a/static/graphs/3240cbe4-c550-443b-aa76-cc2a7058b870 b/static/graphs/3240cbe4-c550-443b-aa76-cc2a7058b870 new file mode 100644 index 0000000..60e9451 --- /dev/null +++ b/static/graphs/3240cbe4-c550-443b-aa76-cc2a7058b870 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=SNUGRIDE - S0159" [label="mitre-enterprise-attack-malware\nSNUGRIDE - S0159",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SNUGRIDE - S0159" -> "tool=SNUGRIDE" [label="similar",dir="both"];"mitre-enterprise-attack-malware=SNUGRIDE - S0159" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=SNUGRIDE" [label="tool\nSNUGRIDE",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/3240cbe4-c550-443b-aa76-cc2a7058b870.png b/static/graphs/3240cbe4-c550-443b-aa76-cc2a7058b870.png new file mode 100644 index 0000000..cc99a07 Binary files /dev/null and b/static/graphs/3240cbe4-c550-443b-aa76-cc2a7058b870.png differ diff --git a/static/graphs/326af1cd-78e7-45b7-a326-125d2f7ef8f2 b/static/graphs/326af1cd-78e7-45b7-a326-125d2f7ef8f2 new file mode 100644 index 0000000..e04a150 --- /dev/null +++ b/static/graphs/326af1cd-78e7-45b7-a326-125d2f7ef8f2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Crimson - S0115" [label="mitre-enterprise-attack-malware\nCrimson - S0115",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Crimson - S0115" -> "rat=Crimson" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Crimson - S0115" -> "tool=Crimson" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Crimson - S0115" -> "malpedia=Crimson RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Crimson - S0115" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];"rat=Crimson" [label="rat\nCrimson",shape=box,style=filled,color=deepskyblue];"tool=Crimson" [label="tool\nCrimson",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/326af1cd-78e7-45b7-a326-125d2f7ef8f2.png b/static/graphs/326af1cd-78e7-45b7-a326-125d2f7ef8f2.png new file mode 100644 index 0000000..a81df11 Binary files /dev/null and b/static/graphs/326af1cd-78e7-45b7-a326-125d2f7ef8f2.png differ diff --git a/static/graphs/326eaf7b-5784-4f08-8fc2-61fd5d5bc5fb b/static/graphs/326eaf7b-5784-4f08-8fc2-61fd5d5bc5fb new file mode 100644 index 0000000..fce19e2 --- /dev/null +++ b/static/graphs/326eaf7b-5784-4f08-8fc2-61fd5d5bc5fb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=WireLurker - MOB-S0028" [label="mitre-mobile-attack-malware\nWireLurker - MOB-S0028",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=WireLurker - MOB-S0028" -> "malpedia=WireLurker (OS X)" [label="similar",dir="both"];"mitre-mobile-attack-malware=WireLurker - MOB-S0028" -> "mitre-mobile-attack-attack-pattern=Obfuscated or Encrypted Payload - MOB-T1009" [label="uses",];} diff --git a/static/graphs/326eaf7b-5784-4f08-8fc2-61fd5d5bc5fb.png b/static/graphs/326eaf7b-5784-4f08-8fc2-61fd5d5bc5fb.png new file mode 100644 index 0000000..c6604e5 Binary files /dev/null and b/static/graphs/326eaf7b-5784-4f08-8fc2-61fd5d5bc5fb.png differ diff --git a/static/graphs/32a67552-3b31-47bb-8098-078099bbc813 b/static/graphs/32a67552-3b31-47bb-8098-078099bbc813 new file mode 100644 index 0000000..6e109e2 --- /dev/null +++ b/static/graphs/32a67552-3b31-47bb-8098-078099bbc813 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="similar",dir="both"];"rat=PoisonIvy" -> "tool=poisonivy" [label="similar",dir="both"];"rat=PoisonIvy" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/32a67552-3b31-47bb-8098-078099bbc813.png b/static/graphs/32a67552-3b31-47bb-8098-078099bbc813.png new file mode 100644 index 0000000..2568f89 Binary files /dev/null and b/static/graphs/32a67552-3b31-47bb-8098-078099bbc813.png differ diff --git a/static/graphs/32fafa69-fe3c-49db-afd4-aac2664bcf0d b/static/graphs/32fafa69-fe3c-49db-afd4-aac2664bcf0d new file mode 100644 index 0000000..dc50f8a --- /dev/null +++ b/static/graphs/32fafa69-fe3c-49db-afd4-aac2664bcf0d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Lotus Blossom" [label="threat-actor\nLotus Blossom",shape=octagon,style=filled,color=indianred1];"threat-actor=Lotus Blossom" -> "mitre-enterprise-attack-intrusion-set=Lotus Blossom - G0030" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Lotus Blossom - G0030" [label="mitre-enterprise-attack-intrusion-set\nLotus Blossom - G0030",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Lotus Blossom - G0030" -> "mitre-enterprise-attack-malware=Emissary - S0082" [label="uses",];"mitre-enterprise-attack-malware=Emissary - S0082" [label="mitre-enterprise-attack-malware\nEmissary - S0082",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Emissary - S0082" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/32fafa69-fe3c-49db-afd4-aac2664bcf0d.png b/static/graphs/32fafa69-fe3c-49db-afd4-aac2664bcf0d.png new file mode 100644 index 0000000..b032bf6 Binary files /dev/null and b/static/graphs/32fafa69-fe3c-49db-afd4-aac2664bcf0d.png differ diff --git a/static/graphs/33b86249-5455-4698-a5e5-0c9591e673b9 b/static/graphs/33b86249-5455-4698-a5e5-0c9591e673b9 new file mode 100644 index 0000000..7a66c33 --- /dev/null +++ b/static/graphs/33b86249-5455-4698-a5e5-0c9591e673b9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Matryoshka" [label="rat\nMatryoshka",shape=box,style=filled,color=deepskyblue];"rat=Matryoshka" -> "tool=Matryoshka" [label="similar",dir="both"];"tool=Matryoshka" [label="tool\nMatryoshka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/33b86249-5455-4698-a5e5-0c9591e673b9.png b/static/graphs/33b86249-5455-4698-a5e5-0c9591e673b9.png new file mode 100644 index 0000000..019e95d Binary files /dev/null and b/static/graphs/33b86249-5455-4698-a5e5-0c9591e673b9.png differ diff --git a/static/graphs/33b9e38f-103c-412d-bdcf-904a91fff1e4 b/static/graphs/33b9e38f-103c-412d-bdcf-904a91fff1e4 new file mode 100644 index 0000000..9506968 --- /dev/null +++ b/static/graphs/33b9e38f-103c-412d-bdcf-904a91fff1e4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=spwebmember - S0227" [label="mitre-enterprise-attack-tool\nspwebmember - S0227",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=spwebmember - S0227" -> "mitre-enterprise-attack-attack-pattern=Data from Information Repositories - T1213" [label="uses",];} diff --git a/static/graphs/33b9e38f-103c-412d-bdcf-904a91fff1e4.png b/static/graphs/33b9e38f-103c-412d-bdcf-904a91fff1e4.png new file mode 100644 index 0000000..3843bbb Binary files /dev/null and b/static/graphs/33b9e38f-103c-412d-bdcf-904a91fff1e4.png differ diff --git a/static/graphs/33d9d91d-aad9-49d5-a516-220ce101ac8a b/static/graphs/33d9d91d-aad9-49d5-a516-220ce101ac8a new file mode 100644 index 0000000..d671ab2 --- /dev/null +++ b/static/graphs/33d9d91d-aad9-49d5-a516-220ce101ac8a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=Pegasus - MOB-S0005" [label="mitre-mobile-attack-malware\nPegasus - MOB-S0005",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Pegasus - MOB-S0005" -> "tool=Chrysaor" [label="similar",dir="both"];"mitre-mobile-attack-malware=Pegasus - MOB-S0005" -> "malpedia=Chrysaor" [label="similar",dir="both"];"mitre-mobile-attack-malware=Pegasus - MOB-S0005" -> "mitre-mobile-attack-attack-pattern=Capture SMS Messages - MOB-T1015" [label="uses",];"mitre-mobile-attack-malware=Pegasus - MOB-S0005" -> "mitre-mobile-attack-attack-pattern=Exploit OS Vulnerability - MOB-T1007" [label="uses",];"tool=Chrysaor" [label="tool\nChrysaor",shape=box,style=filled,color=deepskyblue];"tool=Chrysaor" -> "mitre-mobile-attack-malware=Pegasus for Android - MOB-S0032" [label="similar",dir="both"];"mitre-mobile-attack-malware=Pegasus for Android - MOB-S0032" [label="mitre-mobile-attack-malware\nPegasus for Android - MOB-S0032",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Pegasus for Android - MOB-S0032" -> "mitre-mobile-attack-attack-pattern=Application Discovery - MOB-T1021" [label="uses",];} diff --git a/static/graphs/33d9d91d-aad9-49d5-a516-220ce101ac8a.png b/static/graphs/33d9d91d-aad9-49d5-a516-220ce101ac8a.png new file mode 100644 index 0000000..3f17597 Binary files /dev/null and b/static/graphs/33d9d91d-aad9-49d5-a516-220ce101ac8a.png differ diff --git a/static/graphs/33f76731-b840-446f-bee0-53687dad24d9 b/static/graphs/33f76731-b840-446f-bee0-53687dad24d9 new file mode 100644 index 0000000..6958592 --- /dev/null +++ b/static/graphs/33f76731-b840-446f-bee0-53687dad24d9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Image File Execution Options Injection Mitigation - T1183" [label="mitre-enterprise-attack-course-of-action\nImage File Execution Options Injection Mitigation - T1183",shape=ellipse];"mitre-enterprise-attack-course-of-action=Image File Execution Options Injection Mitigation - T1183" -> "mitre-enterprise-attack-attack-pattern=Image File Execution Options Injection - T1183" [label="mitigates",];} diff --git a/static/graphs/33f76731-b840-446f-bee0-53687dad24d9.png b/static/graphs/33f76731-b840-446f-bee0-53687dad24d9.png new file mode 100644 index 0000000..828875f Binary files /dev/null and b/static/graphs/33f76731-b840-446f-bee0-53687dad24d9.png differ diff --git a/static/graphs/347e7a64-8ee2-487f-bcb3-ca7564fa836c b/static/graphs/347e7a64-8ee2-487f-bcb3-ca7564fa836c new file mode 100644 index 0000000..bbc60a7 --- /dev/null +++ b/static/graphs/347e7a64-8ee2-487f-bcb3-ca7564fa836c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Simda" [label="botnet\nSimda",shape=box,style=filled,color=deepskyblue];"botnet=Simda" -> "malpedia=Simda" [label="similar",dir="both"];} diff --git a/static/graphs/347e7a64-8ee2-487f-bcb3-ca7564fa836c.png b/static/graphs/347e7a64-8ee2-487f-bcb3-ca7564fa836c.png new file mode 100644 index 0000000..f8e9d8b Binary files /dev/null and b/static/graphs/347e7a64-8ee2-487f-bcb3-ca7564fa836c.png differ diff --git a/static/graphs/34d6a2ef-370e-4d21-a34b-6208b7c78f31 b/static/graphs/34d6a2ef-370e-4d21-a34b-6208b7c78f31 new file mode 100644 index 0000000..c945c2e --- /dev/null +++ b/static/graphs/34d6a2ef-370e-4d21-a34b-6208b7c78f31 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Process Doppelgänging Mitigation - T1186" [label="mitre-enterprise-attack-course-of-action\nProcess Doppelgänging Mitigation - T1186",shape=ellipse];"mitre-enterprise-attack-course-of-action=Process Doppelgänging Mitigation - T1186" -> "mitre-enterprise-attack-attack-pattern=Process Doppelgänging - T1186" [label="mitigates",];} diff --git a/static/graphs/34d6a2ef-370e-4d21-a34b-6208b7c78f31.png b/static/graphs/34d6a2ef-370e-4d21-a34b-6208b7c78f31.png new file mode 100644 index 0000000..c56e37a Binary files /dev/null and b/static/graphs/34d6a2ef-370e-4d21-a34b-6208b7c78f31.png differ diff --git a/static/graphs/34efb2fd-4dc2-40d4-a564-0c147c85034d b/static/graphs/34efb2fd-4dc2-40d4-a564-0c147c85034d new file mode 100644 index 0000000..1eb14e0 --- /dev/null +++ b/static/graphs/34efb2fd-4dc2-40d4-a564-0c147c85034d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=File Deletion Mitigation - T1107" [label="mitre-enterprise-attack-course-of-action\nFile Deletion Mitigation - T1107",shape=ellipse];"mitre-enterprise-attack-course-of-action=File Deletion Mitigation - T1107" -> "mitre-enterprise-attack-attack-pattern=File Deletion - T1107" [label="mitigates",];} diff --git a/static/graphs/34efb2fd-4dc2-40d4-a564-0c147c85034d.png b/static/graphs/34efb2fd-4dc2-40d4-a564-0c147c85034d.png new file mode 100644 index 0000000..c72c1a1 Binary files /dev/null and b/static/graphs/34efb2fd-4dc2-40d4-a564-0c147c85034d.png differ diff --git a/static/graphs/35849d8f-5bac-475b-82f8-7d555f37de12 b/static/graphs/35849d8f-5bac-475b-82f8-7d555f37de12 new file mode 100644 index 0000000..daa749c --- /dev/null +++ b/static/graphs/35849d8f-5bac-475b-82f8-7d555f37de12 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Sathurbot" [label="tool\nSathurbot",shape=box,style=filled,color=deepskyblue];"tool=Sathurbot" -> "malpedia=Sathurbot" [label="similar",dir="both"];} diff --git a/static/graphs/35849d8f-5bac-475b-82f8-7d555f37de12.png b/static/graphs/35849d8f-5bac-475b-82f8-7d555f37de12.png new file mode 100644 index 0000000..d7852a5 Binary files /dev/null and b/static/graphs/35849d8f-5bac-475b-82f8-7d555f37de12.png differ diff --git a/static/graphs/35e25aad-7c39-4a1d-aa17-73fa638362e8 b/static/graphs/35e25aad-7c39-4a1d-aa17-73fa638362e8 new file mode 100644 index 0000000..0d8fc00 --- /dev/null +++ b/static/graphs/35e25aad-7c39-4a1d-aa17-73fa638362e8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Cutwail" [label="botnet\nCutwail",shape=box,style=filled,color=deepskyblue];"botnet=Cutwail" -> "malpedia=Cutwail" [label="similar",dir="both"];} diff --git a/static/graphs/35e25aad-7c39-4a1d-aa17-73fa638362e8.png b/static/graphs/35e25aad-7c39-4a1d-aa17-73fa638362e8.png new file mode 100644 index 0000000..edc1804 Binary files /dev/null and b/static/graphs/35e25aad-7c39-4a1d-aa17-73fa638362e8.png differ diff --git a/static/graphs/361d7a90-2fde-4fc7-91ed-fdce26eb790f b/static/graphs/361d7a90-2fde-4fc7-91ed-fdce26eb790f new file mode 100644 index 0000000..f56008e --- /dev/null +++ b/static/graphs/361d7a90-2fde-4fc7-91ed-fdce26eb790f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Thanatos" [label="ransomware\nThanatos",shape=box,style=filled,color=deepskyblue];"ransomware=Thanatos" -> "malpedia=Thanatos" [label="similar",dir="both"];} diff --git a/static/graphs/361d7a90-2fde-4fc7-91ed-fdce26eb790f.png b/static/graphs/361d7a90-2fde-4fc7-91ed-fdce26eb790f.png new file mode 100644 index 0000000..c9f1f7f Binary files /dev/null and b/static/graphs/361d7a90-2fde-4fc7-91ed-fdce26eb790f.png differ diff --git a/static/graphs/362dc67f-4e85-4562-9dac-1b6b7f3ec4b5 b/static/graphs/362dc67f-4e85-4562-9dac-1b6b7f3ec4b5 new file mode 100644 index 0000000..a6aa064 --- /dev/null +++ b/static/graphs/362dc67f-4e85-4562-9dac-1b6b7f3ec4b5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=ifconfig - S0101" [label="mitre-enterprise-attack-tool\nifconfig - S0101",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=ifconfig - S0101" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];} diff --git a/static/graphs/362dc67f-4e85-4562-9dac-1b6b7f3ec4b5.png b/static/graphs/362dc67f-4e85-4562-9dac-1b6b7f3ec4b5.png new file mode 100644 index 0000000..7cab955 Binary files /dev/null and b/static/graphs/362dc67f-4e85-4562-9dac-1b6b7f3ec4b5.png differ diff --git a/static/graphs/363bc05d-13cb-4e98-a5b7-e250f2bbdc2b b/static/graphs/363bc05d-13cb-4e98-a5b7-e250f2bbdc2b new file mode 100644 index 0000000..bbb44fe --- /dev/null +++ b/static/graphs/363bc05d-13cb-4e98-a5b7-e250f2bbdc2b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=RCSAndroid - MOB-S0011" [label="mitre-mobile-attack-malware\nRCSAndroid - MOB-S0011",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=RCSAndroid - MOB-S0011" -> "mitre-mobile-attack-attack-pattern=Download New Code at Runtime - MOB-T1010" [label="uses",];"mitre-mobile-attack-malware=RCSAndroid - MOB-S0011" -> "mitre-mobile-attack-attack-pattern=Alternate Network Mediums - MOB-T1041" [label="uses",];} diff --git a/static/graphs/363bc05d-13cb-4e98-a5b7-e250f2bbdc2b.png b/static/graphs/363bc05d-13cb-4e98-a5b7-e250f2bbdc2b.png new file mode 100644 index 0000000..42e0522 Binary files /dev/null and b/static/graphs/363bc05d-13cb-4e98-a5b7-e250f2bbdc2b.png differ diff --git a/static/graphs/36c0faf0-428e-4e7f-93c5-824bb0495ac9 b/static/graphs/36c0faf0-428e-4e7f-93c5-824bb0495ac9 new file mode 100644 index 0000000..10ce914 --- /dev/null +++ b/static/graphs/36c0faf0-428e-4e7f-93c5-824bb0495ac9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Wipbot" [label="tool\nWipbot",shape=box,style=filled,color=deepskyblue];"tool=Wipbot" -> "mitre-enterprise-attack-malware=Epic - S0091" [label="similar",dir="both"];"tool=Wipbot" -> "malpedia=Wipbot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Epic - S0091" [label="mitre-enterprise-attack-malware\nEpic - S0091",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Epic - S0091" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/36c0faf0-428e-4e7f-93c5-824bb0495ac9.png b/static/graphs/36c0faf0-428e-4e7f-93c5-824bb0495ac9.png new file mode 100644 index 0000000..24b8ccd Binary files /dev/null and b/static/graphs/36c0faf0-428e-4e7f-93c5-824bb0495ac9.png differ diff --git a/static/graphs/3753cc21-2dae-4dfb-8481-d004e74502cc b/static/graphs/3753cc21-2dae-4dfb-8481-d004e74502cc new file mode 100644 index 0000000..6780d0e --- /dev/null +++ b/static/graphs/3753cc21-2dae-4dfb-8481-d004e74502cc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=FIN7 - G0046" [label="mitre-enterprise-attack-intrusion-set\nFIN7 - G0046",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=FIN7 - G0046" -> "threat-actor=FIN7" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=FIN7 - G0046" -> "mitre-enterprise-attack-intrusion-set=Carbanak - G0008" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=FIN7 - G0046" -> "mitre-enterprise-attack-attack-pattern=Scheduled Task - T1053" [label="uses",];"mitre-enterprise-attack-intrusion-set=Carbanak - G0008" [label="mitre-enterprise-attack-intrusion-set\nCarbanak - G0008",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Carbanak - G0008" -> "mitre-enterprise-attack-attack-pattern=Remote Access Tools - T1219" [label="uses",];"threat-actor=FIN7" [label="threat-actor\nFIN7",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/3753cc21-2dae-4dfb-8481-d004e74502cc.png b/static/graphs/3753cc21-2dae-4dfb-8481-d004e74502cc.png new file mode 100644 index 0000000..ca67017 Binary files /dev/null and b/static/graphs/3753cc21-2dae-4dfb-8481-d004e74502cc.png differ diff --git a/static/graphs/37a3f3f5-76e6-43fe-b935-f1f494c95725 b/static/graphs/37a3f3f5-76e6-43fe-b935-f1f494c95725 new file mode 100644 index 0000000..f4317a5 --- /dev/null +++ b/static/graphs/37a3f3f5-76e6-43fe-b935-f1f494c95725 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Exploitation for Defense Evasion Mitigation - T1211" [label="mitre-enterprise-attack-course-of-action\nExploitation for Defense Evasion Mitigation - T1211",shape=ellipse];"mitre-enterprise-attack-course-of-action=Exploitation for Defense Evasion Mitigation - T1211" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Defense Evasion - T1211" [label="mitigates",];} diff --git a/static/graphs/37a3f3f5-76e6-43fe-b935-f1f494c95725.png b/static/graphs/37a3f3f5-76e6-43fe-b935-f1f494c95725.png new file mode 100644 index 0000000..38f3041 Binary files /dev/null and b/static/graphs/37a3f3f5-76e6-43fe-b935-f1f494c95725.png differ diff --git a/static/graphs/37cc7eb6-12e3-467b-82e8-f20f2cc73c69 b/static/graphs/37cc7eb6-12e3-467b-82e8-f20f2cc73c69 new file mode 100644 index 0000000..5ac92f6 --- /dev/null +++ b/static/graphs/37cc7eb6-12e3-467b-82e8-f20f2cc73c69 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Prikormka - S0113" [label="mitre-enterprise-attack-malware\nPrikormka - S0113",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Prikormka - S0113" -> "tool=Prikormka" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Prikormka - S0113" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];"tool=Prikormka" [label="tool\nPrikormka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/37cc7eb6-12e3-467b-82e8-f20f2cc73c69.png b/static/graphs/37cc7eb6-12e3-467b-82e8-f20f2cc73c69.png new file mode 100644 index 0000000..4c419a9 Binary files /dev/null and b/static/graphs/37cc7eb6-12e3-467b-82e8-f20f2cc73c69.png differ diff --git a/static/graphs/381fcf73-60f6-4ab2-9991-6af3cbc35192 b/static/graphs/381fcf73-60f6-4ab2-9991-6af3cbc35192 new file mode 100644 index 0000000..d993b70 --- /dev/null +++ b/static/graphs/381fcf73-60f6-4ab2-9991-6af3cbc35192 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" [label="mitre-enterprise-attack-intrusion-set\nSandworm Team - G0034",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" -> "threat-actor=Sandworm" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" -> "threat-actor=TeleBots" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" -> "threat-actor=ELECTRUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" -> "mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="uses",];"mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="mitre-enterprise-attack-malware\nBlackEnergy - S0089",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "tool=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "malpedia=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];"threat-actor=Sandworm" [label="threat-actor\nSandworm",shape=octagon,style=filled,color=indianred1];"threat-actor=Sandworm" -> "threat-actor=GreyEnergy" [label="similar",dir="both"];"threat-actor=TeleBots" [label="threat-actor\nTeleBots",shape=octagon,style=filled,color=indianred1];"threat-actor=ELECTRUM" [label="threat-actor\nELECTRUM",shape=octagon,style=filled,color=indianred1];"threat-actor=GreyEnergy" [label="threat-actor\nGreyEnergy",shape=octagon,style=filled,color=indianred1];"tool=BlackEnergy" [label="tool\nBlackEnergy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/381fcf73-60f6-4ab2-9991-6af3cbc35192.png b/static/graphs/381fcf73-60f6-4ab2-9991-6af3cbc35192.png new file mode 100644 index 0000000..2d3bebb Binary files /dev/null and b/static/graphs/381fcf73-60f6-4ab2-9991-6af3cbc35192.png differ diff --git a/static/graphs/383caaa3-c46a-4f61-b2e3-653eb132f0e7 b/static/graphs/383caaa3-c46a-4f61-b2e3-653eb132f0e7 new file mode 100644 index 0000000..db489c1 --- /dev/null +++ b/static/graphs/383caaa3-c46a-4f61-b2e3-653eb132f0e7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Email Collection Mitigation - T1114" [label="mitre-enterprise-attack-course-of-action\nEmail Collection Mitigation - T1114",shape=ellipse];"mitre-enterprise-attack-course-of-action=Email Collection Mitigation - T1114" -> "mitre-enterprise-attack-attack-pattern=Email Collection - T1114" [label="mitigates",];} diff --git a/static/graphs/383caaa3-c46a-4f61-b2e3-653eb132f0e7.png b/static/graphs/383caaa3-c46a-4f61-b2e3-653eb132f0e7.png new file mode 100644 index 0000000..8d46d05 Binary files /dev/null and b/static/graphs/383caaa3-c46a-4f61-b2e3-653eb132f0e7.png differ diff --git a/static/graphs/383d7ebb-9b08-4874-b5d7-dc02b499c38f b/static/graphs/383d7ebb-9b08-4874-b5d7-dc02b499c38f new file mode 100644 index 0000000..75c9aef --- /dev/null +++ b/static/graphs/383d7ebb-9b08-4874-b5d7-dc02b499c38f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoFinancial" [label="ransomware\nCryptoFinancial",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoFinancial" -> "malpedia=Ranscam" [label="similar",dir="both"];} diff --git a/static/graphs/383d7ebb-9b08-4874-b5d7-dc02b499c38f.png b/static/graphs/383d7ebb-9b08-4874-b5d7-dc02b499c38f.png new file mode 100644 index 0000000..b1fac19 Binary files /dev/null and b/static/graphs/383d7ebb-9b08-4874-b5d7-dc02b499c38f.png differ diff --git a/static/graphs/383fd414-3805-11e8-ac12-c7b5af38ff67 b/static/graphs/383fd414-3805-11e8-ac12-c7b5af38ff67 new file mode 100644 index 0000000..0908558 --- /dev/null +++ b/static/graphs/383fd414-3805-11e8-ac12-c7b5af38ff67 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Hajime" [label="botnet\nHajime",shape=box,style=filled,color=deepskyblue];"botnet=Hajime" -> "malpedia=Hajime" [label="similar",dir="both"];} diff --git a/static/graphs/383fd414-3805-11e8-ac12-c7b5af38ff67.png b/static/graphs/383fd414-3805-11e8-ac12-c7b5af38ff67.png new file mode 100644 index 0000000..4fb6ad4 Binary files /dev/null and b/static/graphs/383fd414-3805-11e8-ac12-c7b5af38ff67.png differ diff --git a/static/graphs/388606d3-f38f-45bf-885d-a9dc9df3c8a8 b/static/graphs/388606d3-f38f-45bf-885d-a9dc9df3c8a8 new file mode 100644 index 0000000..4550ad7 --- /dev/null +++ b/static/graphs/388606d3-f38f-45bf-885d-a9dc9df3c8a8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Disabling Security Tools Mitigation - T1089" [label="mitre-enterprise-attack-course-of-action\nDisabling Security Tools Mitigation - T1089",shape=ellipse];"mitre-enterprise-attack-course-of-action=Disabling Security Tools Mitigation - T1089" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="mitigates",];} diff --git a/static/graphs/388606d3-f38f-45bf-885d-a9dc9df3c8a8.png b/static/graphs/388606d3-f38f-45bf-885d-a9dc9df3c8a8.png new file mode 100644 index 0000000..7ae5ecf Binary files /dev/null and b/static/graphs/388606d3-f38f-45bf-885d-a9dc9df3c8a8.png differ diff --git a/static/graphs/38952eac-cb1b-4a71-bad2-ee8223a1c8fe b/static/graphs/38952eac-cb1b-4a71-bad2-ee8223a1c8fe new file mode 100644 index 0000000..52716d8 --- /dev/null +++ b/static/graphs/38952eac-cb1b-4a71-bad2-ee8223a1c8fe @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=dsquery - S0105" [label="mitre-enterprise-attack-tool\ndsquery - S0105",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=dsquery - S0105" -> "mitre-enterprise-attack-attack-pattern=Permission Groups Discovery - T1069" [label="uses",];} diff --git a/static/graphs/38952eac-cb1b-4a71-bad2-ee8223a1c8fe.png b/static/graphs/38952eac-cb1b-4a71-bad2-ee8223a1c8fe.png new file mode 100644 index 0000000..547fea3 Binary files /dev/null and b/static/graphs/38952eac-cb1b-4a71-bad2-ee8223a1c8fe.png differ diff --git a/static/graphs/38fd6a28-3353-4f2b-bb2b-459fecd5c648 b/static/graphs/38fd6a28-3353-4f2b-bb2b-459fecd5c648 new file mode 100644 index 0000000..768d5c2 --- /dev/null +++ b/static/graphs/38fd6a28-3353-4f2b-bb2b-459fecd5c648 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=APT18 - G0026" [label="mitre-enterprise-attack-intrusion-set\nAPT18 - G0026",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT18 - G0026" -> "threat-actor=Wekby" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT18 - G0026" -> "threat-actor=Samurai Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT18 - G0026" -> "threat-actor=Maverick Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT18 - G0026" -> "mitre-enterprise-attack-attack-pattern=File Deletion - T1107" [label="uses",];"threat-actor=Wekby" [label="threat-actor\nWekby",shape=octagon,style=filled,color=indianred1];"threat-actor=Samurai Panda" [label="threat-actor\nSamurai Panda",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/38fd6a28-3353-4f2b-bb2b-459fecd5c648.png b/static/graphs/38fd6a28-3353-4f2b-bb2b-459fecd5c648.png new file mode 100644 index 0000000..3f2ed12 Binary files /dev/null and b/static/graphs/38fd6a28-3353-4f2b-bb2b-459fecd5c648.png differ diff --git a/static/graphs/390abe30-8b9e-439e-a6d3-2ee978f05fba b/static/graphs/390abe30-8b9e-439e-a6d3-2ee978f05fba new file mode 100644 index 0000000..bbf9576 --- /dev/null +++ b/static/graphs/390abe30-8b9e-439e-a6d3-2ee978f05fba @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=GNL Locker" [label="ransomware\nGNL Locker",shape=box,style=filled,color=deepskyblue];"ransomware=GNL Locker" -> "ransomware=Zyklon" [label="similar",dir="both"];"ransomware=GNL Locker" -> "malpedia=Zyklon" [label="similar",dir="both"];"ransomware=Zyklon" [label="ransomware\nZyklon",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/390abe30-8b9e-439e-a6d3-2ee978f05fba.png b/static/graphs/390abe30-8b9e-439e-a6d3-2ee978f05fba.png new file mode 100644 index 0000000..3163635 Binary files /dev/null and b/static/graphs/390abe30-8b9e-439e-a6d3-2ee978f05fba.png differ diff --git a/static/graphs/3948ce95-468e-4ce1-82b1-57439c6d6afd b/static/graphs/3948ce95-468e-4ce1-82b1-57439c6d6afd new file mode 100644 index 0000000..eb7493b --- /dev/null +++ b/static/graphs/3948ce95-468e-4ce1-82b1-57439c6d6afd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=CORESHELL" [label="tool\nCORESHELL",shape=box,style=filled,color=deepskyblue];"tool=CORESHELL" -> "mitre-enterprise-attack-malware=CORESHELL - S0137" [label="similar",dir="both"];"tool=CORESHELL" -> "tool=SOURFACE" [label="similar",dir="both"];"tool=CORESHELL" -> "android=Sofacy" [label="similar",dir="both"];"tool=CORESHELL" -> "mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="similar",dir="both"];"tool=CORESHELL" -> "tool=GAMEFISH" [label="similar",dir="both"];"tool=CORESHELL" -> "mitre-enterprise-attack-malware=Komplex - S0162" [label="similar",dir="both"];"tool=CORESHELL" -> "malpedia=Komplex" [label="similar",dir="both"];"tool=CORESHELL" -> "malpedia=Seduploader" [label="similar",dir="both"];"android=Sofacy" [label="android\nSofacy",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" [label="mitre-enterprise-attack-malware\nKomplex - S0162",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"mitre-enterprise-attack-malware=CORESHELL - S0137" [label="mitre-enterprise-attack-malware\nCORESHELL - S0137",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CORESHELL - S0137" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="mitre-enterprise-attack-malware\nJHUHUGIT - S0044",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Privilege Escalation - T1068" [label="uses",];"tool=GAMEFISH" [label="tool\nGAMEFISH",shape=box,style=filled,color=deepskyblue];"tool=SOURFACE" [label="tool\nSOURFACE",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/3948ce95-468e-4ce1-82b1-57439c6d6afd.png b/static/graphs/3948ce95-468e-4ce1-82b1-57439c6d6afd.png new file mode 100644 index 0000000..1dc2cda Binary files /dev/null and b/static/graphs/3948ce95-468e-4ce1-82b1-57439c6d6afd.png differ diff --git a/static/graphs/39706d54-0d06-4a25-816a-78cc43455100 b/static/graphs/39706d54-0d06-4a25-816a-78cc43455100 new file mode 100644 index 0000000..873ac28 --- /dev/null +++ b/static/graphs/39706d54-0d06-4a25-816a-78cc43455100 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Data from Removable Media Mitigation - T1025" [label="mitre-enterprise-attack-course-of-action\nData from Removable Media Mitigation - T1025",shape=ellipse];"mitre-enterprise-attack-course-of-action=Data from Removable Media Mitigation - T1025" -> "mitre-enterprise-attack-attack-pattern=Data from Removable Media - T1025" [label="mitigates",];} diff --git a/static/graphs/39706d54-0d06-4a25-816a-78cc43455100.png b/static/graphs/39706d54-0d06-4a25-816a-78cc43455100.png new file mode 100644 index 0000000..801648a Binary files /dev/null and b/static/graphs/39706d54-0d06-4a25-816a-78cc43455100.png differ diff --git a/static/graphs/399d9038-b100-43ef-b28d-a5065106b935 b/static/graphs/399d9038-b100-43ef-b28d-a5065106b935 new file mode 100644 index 0000000..40d83e8 --- /dev/null +++ b/static/graphs/399d9038-b100-43ef-b28d-a5065106b935 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Standard Non-Application Layer Protocol Mitigation - T1095" [label="mitre-enterprise-attack-course-of-action\nStandard Non-Application Layer Protocol Mitigation - T1095",shape=ellipse];"mitre-enterprise-attack-course-of-action=Standard Non-Application Layer Protocol Mitigation - T1095" -> "mitre-enterprise-attack-attack-pattern=Standard Non-Application Layer Protocol - T1095" [label="mitigates",];} diff --git a/static/graphs/399d9038-b100-43ef-b28d-a5065106b935.png b/static/graphs/399d9038-b100-43ef-b28d-a5065106b935.png new file mode 100644 index 0000000..da40185 Binary files /dev/null and b/static/graphs/399d9038-b100-43ef-b28d-a5065106b935.png differ diff --git a/static/graphs/3a1fc564-3705-4cc0-8f80-13c58d470d34 b/static/graphs/3a1fc564-3705-4cc0-8f80-13c58d470d34 new file mode 100644 index 0000000..0522b9c --- /dev/null +++ b/static/graphs/3a1fc564-3705-4cc0-8f80-13c58d470d34 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Blackshades" [label="rat\nBlackshades",shape=box,style=filled,color=deepskyblue];"rat=Blackshades" -> "tool=Blackshades" [label="similar",dir="both"];"tool=Blackshades" [label="tool\nBlackshades",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/3a1fc564-3705-4cc0-8f80-13c58d470d34.png b/static/graphs/3a1fc564-3705-4cc0-8f80-13c58d470d34.png new file mode 100644 index 0000000..de576fa Binary files /dev/null and b/static/graphs/3a1fc564-3705-4cc0-8f80-13c58d470d34.png differ diff --git a/static/graphs/3a41b366-cfd6-4af2-a6e7-3c6e3c4ebcef b/static/graphs/3a41b366-cfd6-4af2-a6e7-3c6e3c4ebcef new file mode 100644 index 0000000..98a0bde --- /dev/null +++ b/static/graphs/3a41b366-cfd6-4af2-a6e7-3c6e3c4ebcef @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Control Panel Items Mitigation - T1196" [label="mitre-enterprise-attack-course-of-action\nControl Panel Items Mitigation - T1196",shape=ellipse];"mitre-enterprise-attack-course-of-action=Control Panel Items Mitigation - T1196" -> "mitre-enterprise-attack-attack-pattern=Control Panel Items - T1196" [label="mitigates",];} diff --git a/static/graphs/3a41b366-cfd6-4af2-a6e7-3c6e3c4ebcef.png b/static/graphs/3a41b366-cfd6-4af2-a6e7-3c6e3c4ebcef.png new file mode 100644 index 0000000..2e34b96 Binary files /dev/null and b/static/graphs/3a41b366-cfd6-4af2-a6e7-3c6e3c4ebcef.png differ diff --git a/static/graphs/3a476d83-43eb-4fad-9b75-b1febd834e3d b/static/graphs/3a476d83-43eb-4fad-9b75-b1febd834e3d new file mode 100644 index 0000000..d580b1f --- /dev/null +++ b/static/graphs/3a476d83-43eb-4fad-9b75-b1febd834e3d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Pass the Ticket Mitigation - T1097" [label="mitre-enterprise-attack-course-of-action\nPass the Ticket Mitigation - T1097",shape=ellipse];"mitre-enterprise-attack-course-of-action=Pass the Ticket Mitigation - T1097" -> "mitre-enterprise-attack-attack-pattern=Pass the Ticket - T1097" [label="mitigates",];} diff --git a/static/graphs/3a476d83-43eb-4fad-9b75-b1febd834e3d.png b/static/graphs/3a476d83-43eb-4fad-9b75-b1febd834e3d.png new file mode 100644 index 0000000..d67366f Binary files /dev/null and b/static/graphs/3a476d83-43eb-4fad-9b75-b1febd834e3d.png differ diff --git a/static/graphs/3bc1f0ad-ef11-4afc-83c0-fcffe08d4e50 b/static/graphs/3bc1f0ad-ef11-4afc-83c0-fcffe08d4e50 new file mode 100644 index 0000000..2278fcf --- /dev/null +++ b/static/graphs/3bc1f0ad-ef11-4afc-83c0-fcffe08d4e50 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=KeyRaider - MOB-S0004" [label="mitre-mobile-attack-malware\nKeyRaider - MOB-S0004",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=KeyRaider - MOB-S0004" -> "mitre-mobile-attack-attack-pattern=Network Traffic Capture or Redirection - MOB-T1013" [label="uses",];"mitre-mobile-attack-malware=KeyRaider - MOB-S0004" -> "mitre-mobile-attack-attack-pattern=Lock User Out of Device - MOB-T1049" [label="uses",];} diff --git a/static/graphs/3bc1f0ad-ef11-4afc-83c0-fcffe08d4e50.png b/static/graphs/3bc1f0ad-ef11-4afc-83c0-fcffe08d4e50.png new file mode 100644 index 0000000..9878c27 Binary files /dev/null and b/static/graphs/3bc1f0ad-ef11-4afc-83c0-fcffe08d4e50.png differ diff --git a/static/graphs/3c02fb1f-cbdb-48f5-abaf-8c81d6e0c322 b/static/graphs/3c02fb1f-cbdb-48f5-abaf-8c81d6e0c322 new file mode 100644 index 0000000..793c515 --- /dev/null +++ b/static/graphs/3c02fb1f-cbdb-48f5-abaf-8c81d6e0c322 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=KARAE - S0215" [label="mitre-enterprise-attack-malware\nKARAE - S0215",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=KARAE - S0215" -> "tool=KARAE" [label="similar",dir="both"];"mitre-enterprise-attack-malware=KARAE - S0215" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];"tool=KARAE" [label="tool\nKARAE",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/3c02fb1f-cbdb-48f5-abaf-8c81d6e0c322.png b/static/graphs/3c02fb1f-cbdb-48f5-abaf-8c81d6e0c322.png new file mode 100644 index 0000000..462aa54 Binary files /dev/null and b/static/graphs/3c02fb1f-cbdb-48f5-abaf-8c81d6e0c322.png differ diff --git a/static/graphs/3c1003a2-8364-467a-b9b8-fcc19724a9b5 b/static/graphs/3c1003a2-8364-467a-b9b8-fcc19724a9b5 new file mode 100644 index 0000000..48f81cd --- /dev/null +++ b/static/graphs/3c1003a2-8364-467a-b9b8-fcc19724a9b5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=FlawedAmmyy" [label="rat\nFlawedAmmyy",shape=box,style=filled,color=deepskyblue];"rat=FlawedAmmyy" -> "malpedia=FlawedAmmyy" [label="similar",dir="both"];} diff --git a/static/graphs/3c1003a2-8364-467a-b9b8-fcc19724a9b5.png b/static/graphs/3c1003a2-8364-467a-b9b8-fcc19724a9b5.png new file mode 100644 index 0000000..cea0326 Binary files /dev/null and b/static/graphs/3c1003a2-8364-467a-b9b8-fcc19724a9b5.png differ diff --git a/static/graphs/3c3b5442-f81f-4011-a176-f0f63e6fcd3f b/static/graphs/3c3b5442-f81f-4011-a176-f0f63e6fcd3f new file mode 100644 index 0000000..9455f83 --- /dev/null +++ b/static/graphs/3c3b5442-f81f-4011-a176-f0f63e6fcd3f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Ogonia" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/3c3b5442-f81f-4011-a176-f0f63e6fcd3f.png b/static/graphs/3c3b5442-f81f-4011-a176-f0f63e6fcd3f.png new file mode 100644 index 0000000..a42111e Binary files /dev/null and b/static/graphs/3c3b5442-f81f-4011-a176-f0f63e6fcd3f.png differ diff --git a/static/graphs/3c3b55a6-c3e9-4043-8aae-283fe96220c0 b/static/graphs/3c3b55a6-c3e9-4043-8aae-283fe96220c0 new file mode 100644 index 0000000..4a27737 --- /dev/null +++ b/static/graphs/3c3b55a6-c3e9-4043-8aae-283fe96220c0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=ZergHelper - MOB-S0003" [label="mitre-mobile-attack-malware\nZergHelper - MOB-S0003",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=ZergHelper - MOB-S0003" -> "mitre-mobile-attack-attack-pattern=Detect App Analysis Environment - MOB-T1043" [label="uses",];"mitre-mobile-attack-malware=ZergHelper - MOB-S0003" -> "mitre-mobile-attack-attack-pattern=Download New Code at Runtime - MOB-T1010" [label="uses",];"mitre-mobile-attack-attack-pattern=Detect App Analysis Environment - MOB-T1043" [label="mitre-mobile-attack-attack-pattern\nDetect App Analysis Environment - MOB-T1043",shape=ellipse];} diff --git a/static/graphs/3c3b55a6-c3e9-4043-8aae-283fe96220c0.png b/static/graphs/3c3b55a6-c3e9-4043-8aae-283fe96220c0.png new file mode 100644 index 0000000..0ac5dd3 Binary files /dev/null and b/static/graphs/3c3b55a6-c3e9-4043-8aae-283fe96220c0.png differ diff --git a/static/graphs/3c51fc0e-42d8-4ff0-b1bd-5c8c20271a39 b/static/graphs/3c51fc0e-42d8-4ff0-b1bd-5c8c20271a39 new file mode 100644 index 0000000..60436da --- /dev/null +++ b/static/graphs/3c51fc0e-42d8-4ff0-b1bd-5c8c20271a39 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Offline ransomware" [label="ransomware\nOffline ransomware",shape=box,style=filled,color=deepskyblue];"ransomware=Offline ransomware" -> "ransomware=Cryakl" [label="similar",dir="both"];"ransomware=Offline ransomware" -> "malpedia=Cryakl" [label="similar",dir="both"];"ransomware=Cryakl" [label="ransomware\nCryakl",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/3c51fc0e-42d8-4ff0-b1bd-5c8c20271a39.png b/static/graphs/3c51fc0e-42d8-4ff0-b1bd-5c8c20271a39.png new file mode 100644 index 0000000..3b596a7 Binary files /dev/null and b/static/graphs/3c51fc0e-42d8-4ff0-b1bd-5c8c20271a39.png differ diff --git a/static/graphs/3cab1b76-2f40-4cd0-8d2c-7ed16eeb909c b/static/graphs/3cab1b76-2f40-4cd0-8d2c-7ed16eeb909c new file mode 100644 index 0000000..07caccf --- /dev/null +++ b/static/graphs/3cab1b76-2f40-4cd0-8d2c-7ed16eeb909c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=ELMER - S0064" [label="mitre-enterprise-attack-malware\nELMER - S0064",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ELMER - S0064" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/3cab1b76-2f40-4cd0-8d2c-7ed16eeb909c.png b/static/graphs/3cab1b76-2f40-4cd0-8d2c-7ed16eeb909c.png new file mode 100644 index 0000000..5a4248c Binary files /dev/null and b/static/graphs/3cab1b76-2f40-4cd0-8d2c-7ed16eeb909c.png differ diff --git a/static/graphs/3cf2c880-e0b5-4311-9c4e-6293f2a566e7 b/static/graphs/3cf2c880-e0b5-4311-9c4e-6293f2a566e7 new file mode 100644 index 0000000..faa826a --- /dev/null +++ b/static/graphs/3cf2c880-e0b5-4311-9c4e-6293f2a566e7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Bart" [label="ransomware\nBart",shape=box,style=filled,color=deepskyblue];"ransomware=Bart" -> "malpedia=Bart" [label="similar",dir="both"];} diff --git a/static/graphs/3cf2c880-e0b5-4311-9c4e-6293f2a566e7.png b/static/graphs/3cf2c880-e0b5-4311-9c4e-6293f2a566e7.png new file mode 100644 index 0000000..78b40e0 Binary files /dev/null and b/static/graphs/3cf2c880-e0b5-4311-9c4e-6293f2a566e7.png differ diff --git a/static/graphs/3d3aa832-8847-47c5-9e31-ef13ab7ab6fb b/static/graphs/3d3aa832-8847-47c5-9e31-ef13ab7ab6fb new file mode 100644 index 0000000..e891c33 --- /dev/null +++ b/static/graphs/3d3aa832-8847-47c5-9e31-ef13ab7ab6fb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=GM Bot" [label="android\nGM Bot",shape=box,style=filled,color=deepskyblue];"android=GM Bot" -> "tool=Slempo" [label="similar",dir="both"];"android=GM Bot" -> "android=Bankosy" [label="similar",dir="both"];"android=GM Bot" -> "malpedia=Slempo" [label="similar",dir="both"];"android=Bankosy" [label="android\nBankosy",shape=box,style=filled,color=deepskyblue];"tool=Slempo" [label="tool\nSlempo",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/3d3aa832-8847-47c5-9e31-ef13ab7ab6fb.png b/static/graphs/3d3aa832-8847-47c5-9e31-ef13ab7ab6fb.png new file mode 100644 index 0000000..8db6c17 Binary files /dev/null and b/static/graphs/3d3aa832-8847-47c5-9e31-ef13ab7ab6fb.png differ diff --git a/static/graphs/3d7c771b-b175-41c9-8ba1-904ef29715fa b/static/graphs/3d7c771b-b175-41c9-8ba1-904ef29715fa new file mode 100644 index 0000000..f8bd512 --- /dev/null +++ b/static/graphs/3d7c771b-b175-41c9-8ba1-904ef29715fa @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=BetaBot" [label="botnet\nBetaBot",shape=box,style=filled,color=deepskyblue];"botnet=BetaBot" -> "malpedia=BetaBot" [label="similar",dir="both"];} diff --git a/static/graphs/3d7c771b-b175-41c9-8ba1-904ef29715fa.png b/static/graphs/3d7c771b-b175-41c9-8ba1-904ef29715fa.png new file mode 100644 index 0000000..1129b4b Binary files /dev/null and b/static/graphs/3d7c771b-b175-41c9-8ba1-904ef29715fa.png differ diff --git a/static/graphs/3d8e547d-9456-4f32-a895-dc86134e282f b/static/graphs/3d8e547d-9456-4f32-a895-dc86134e282f new file mode 100644 index 0000000..6cb8525 --- /dev/null +++ b/static/graphs/3d8e547d-9456-4f32-a895-dc86134e282f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Umbreon - S0221" [label="mitre-enterprise-attack-malware\nUmbreon - S0221",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Umbreon - S0221" -> "tool=Umbreon" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Umbreon - S0221" -> "malpedia=Umbreon" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Umbreon - S0221" -> "mitre-enterprise-attack-attack-pattern=Rootkit - T1014" [label="uses",];"tool=Umbreon" [label="tool\nUmbreon",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/3d8e547d-9456-4f32-a895-dc86134e282f.png b/static/graphs/3d8e547d-9456-4f32-a895-dc86134e282f.png new file mode 100644 index 0000000..98a3211 Binary files /dev/null and b/static/graphs/3d8e547d-9456-4f32-a895-dc86134e282f.png differ diff --git a/static/graphs/3e0c2d35-87cb-40f9-b341-a6c8dbec697e b/static/graphs/3e0c2d35-87cb-40f9-b341-a6c8dbec697e new file mode 100644 index 0000000..ec56d8e --- /dev/null +++ b/static/graphs/3e0c2d35-87cb-40f9-b341-a6c8dbec697e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=EquationDrug" [label="tool\nEquationDrug",shape=box,style=filled,color=deepskyblue];"tool=EquationDrug" -> "malpedia=EquationDrug" [label="similar",dir="both"];} diff --git a/static/graphs/3e0c2d35-87cb-40f9-b341-a6c8dbec697e.png b/static/graphs/3e0c2d35-87cb-40f9-b341-a6c8dbec697e.png new file mode 100644 index 0000000..31f3ddb Binary files /dev/null and b/static/graphs/3e0c2d35-87cb-40f9-b341-a6c8dbec697e.png differ diff --git a/static/graphs/3e19d162-9ee1-11e8-b8d7-d32141691f1f b/static/graphs/3e19d162-9ee1-11e8-b8d7-d32141691f1f new file mode 100644 index 0000000..5a3ffe1 --- /dev/null +++ b/static/graphs/3e19d162-9ee1-11e8-b8d7-d32141691f1f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=Skygofree" [label="android\nSkygofree",shape=box,style=filled,color=deepskyblue];"android=Skygofree" -> "malpedia=Skygofree" [label="similar",dir="both"];} diff --git a/static/graphs/3e19d162-9ee1-11e8-b8d7-d32141691f1f.png b/static/graphs/3e19d162-9ee1-11e8-b8d7-d32141691f1f.png new file mode 100644 index 0000000..64b8739 Binary files /dev/null and b/static/graphs/3e19d162-9ee1-11e8-b8d7-d32141691f1f.png differ diff --git a/static/graphs/3e2c99f9-66cd-48be-86e9-d7c1c164d87c b/static/graphs/3e2c99f9-66cd-48be-86e9-d7c1c164d87c new file mode 100644 index 0000000..f83aa1c --- /dev/null +++ b/static/graphs/3e2c99f9-66cd-48be-86e9-d7c1c164d87c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=X-Agent" [label="tool\nX-Agent",shape=box,style=filled,color=deepskyblue];"tool=X-Agent" -> "mitre-enterprise-attack-malware=CHOPSTICK - S0023" [label="similar",dir="both"];"tool=X-Agent" -> "mitre-mobile-attack-malware=X-Agent - MOB-S0030" [label="similar",dir="both"];"tool=X-Agent" -> "tool=CHOPSTICK" [label="similar",dir="both"];"tool=X-Agent" -> "malpedia=X-Agent (Android)" [label="similar",dir="both"];"mitre-enterprise-attack-malware=CHOPSTICK - S0023" [label="mitre-enterprise-attack-malware\nCHOPSTICK - S0023",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CHOPSTICK - S0023" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="uses",];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" [label="mitre-mobile-attack-malware\nX-Agent - MOB-S0030",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" -> "mitre-mobile-attack-attack-pattern=Repackaged Application - MOB-T1047" [label="uses",];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" -> "mitre-mobile-attack-attack-pattern=Location Tracking - MOB-T1033" [label="uses",];"tool=CHOPSTICK" [label="tool\nCHOPSTICK",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/3e2c99f9-66cd-48be-86e9-d7c1c164d87c.png b/static/graphs/3e2c99f9-66cd-48be-86e9-d7c1c164d87c.png new file mode 100644 index 0000000..9f8623b Binary files /dev/null and b/static/graphs/3e2c99f9-66cd-48be-86e9-d7c1c164d87c.png differ diff --git a/static/graphs/3e7018e9-7389-48e7-9208-0bdbcbba9483 b/static/graphs/3e7018e9-7389-48e7-9208-0bdbcbba9483 new file mode 100644 index 0000000..bfadaea --- /dev/null +++ b/static/graphs/3e7018e9-7389-48e7-9208-0bdbcbba9483 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Clear Command History Mitigation - T1146" [label="mitre-enterprise-attack-course-of-action\nClear Command History Mitigation - T1146",shape=ellipse];"mitre-enterprise-attack-course-of-action=Clear Command History Mitigation - T1146" -> "mitre-enterprise-attack-attack-pattern=Clear Command History - T1146" [label="mitigates",];} diff --git a/static/graphs/3e7018e9-7389-48e7-9208-0bdbcbba9483.png b/static/graphs/3e7018e9-7389-48e7-9208-0bdbcbba9483.png new file mode 100644 index 0000000..48e4e8b Binary files /dev/null and b/static/graphs/3e7018e9-7389-48e7-9208-0bdbcbba9483.png differ diff --git a/static/graphs/3e9f8875-d2f7-4380-a578-84393bd3b025 b/static/graphs/3e9f8875-d2f7-4380-a578-84393bd3b025 new file mode 100644 index 0000000..dfa6e16 --- /dev/null +++ b/static/graphs/3e9f8875-d2f7-4380-a578-84393bd3b025 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Windows Remote Management Mitigation - T1028" [label="mitre-enterprise-attack-course-of-action\nWindows Remote Management Mitigation - T1028",shape=ellipse];"mitre-enterprise-attack-course-of-action=Windows Remote Management Mitigation - T1028" -> "mitre-enterprise-attack-attack-pattern=Windows Remote Management - T1028" [label="mitigates",];} diff --git a/static/graphs/3e9f8875-d2f7-4380-a578-84393bd3b025.png b/static/graphs/3e9f8875-d2f7-4380-a578-84393bd3b025.png new file mode 100644 index 0000000..7614177 Binary files /dev/null and b/static/graphs/3e9f8875-d2f7-4380-a578-84393bd3b025.png differ diff --git a/static/graphs/3eca2d5f-41bf-4ad4-847f-df18befcdc44 b/static/graphs/3eca2d5f-41bf-4ad4-847f-df18befcdc44 new file mode 100644 index 0000000..d588f94 --- /dev/null +++ b/static/graphs/3eca2d5f-41bf-4ad4-847f-df18befcdc44 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Sakula" [label="rat\nSakula",shape=box,style=filled,color=deepskyblue];"rat=Sakula" -> "mitre-enterprise-attack-malware=Sakula - S0074" [label="similar",dir="both"];"rat=Sakula" -> "tool=Sakula" [label="similar",dir="both"];"rat=Sakula" -> "malpedia=Sakula RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Sakula - S0074" [label="mitre-enterprise-attack-malware\nSakula - S0074",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Sakula - S0074" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];"tool=Sakula" [label="tool\nSakula",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/3eca2d5f-41bf-4ad4-847f-df18befcdc44.png b/static/graphs/3eca2d5f-41bf-4ad4-847f-df18befcdc44.png new file mode 100644 index 0000000..2083efe Binary files /dev/null and b/static/graphs/3eca2d5f-41bf-4ad4-847f-df18befcdc44.png differ diff --git a/static/graphs/3f7616bd-f1de-46ee-87c2-43c0c2edaa28 b/static/graphs/3f7616bd-f1de-46ee-87c2-43c0c2edaa28 new file mode 100644 index 0000000..661e0b5 --- /dev/null +++ b/static/graphs/3f7616bd-f1de-46ee-87c2-43c0c2edaa28 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Emotet" [label="tool\nEmotet",shape=box,style=filled,color=deepskyblue];"tool=Emotet" -> "banker=Geodo" [label="similar",dir="both"];"tool=Emotet" -> "malpedia=Emotet" [label="similar",dir="both"];"banker=Geodo" [label="banker\nGeodo",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/3f7616bd-f1de-46ee-87c2-43c0c2edaa28.png b/static/graphs/3f7616bd-f1de-46ee-87c2-43c0c2edaa28.png new file mode 100644 index 0000000..cd329ab Binary files /dev/null and b/static/graphs/3f7616bd-f1de-46ee-87c2-43c0c2edaa28.png differ diff --git a/static/graphs/402e92cd-5608-4f4b-9a34-a2c962e4bcd7 b/static/graphs/402e92cd-5608-4f4b-9a34-a2c962e4bcd7 new file mode 100644 index 0000000..4e1b539 --- /dev/null +++ b/static/graphs/402e92cd-5608-4f4b-9a34-a2c962e4bcd7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Launch Daemon Mitigation - T1160" [label="mitre-enterprise-attack-course-of-action\nLaunch Daemon Mitigation - T1160",shape=ellipse];"mitre-enterprise-attack-course-of-action=Launch Daemon Mitigation - T1160" -> "mitre-enterprise-attack-attack-pattern=Launch Daemon - T1160" [label="mitigates",];} diff --git a/static/graphs/402e92cd-5608-4f4b-9a34-a2c962e4bcd7.png b/static/graphs/402e92cd-5608-4f4b-9a34-a2c962e4bcd7.png new file mode 100644 index 0000000..a827b4f Binary files /dev/null and b/static/graphs/402e92cd-5608-4f4b-9a34-a2c962e4bcd7.png differ diff --git a/static/graphs/40795af6-b721-11e8-9fcb-570c0b384135 b/static/graphs/40795af6-b721-11e8-9fcb-570c0b384135 new file mode 100644 index 0000000..46969b4 --- /dev/null +++ b/static/graphs/40795af6-b721-11e8-9fcb-570c0b384135 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Gafgyt" [label="botnet\nGafgyt",shape=box,style=filled,color=deepskyblue];"botnet=Gafgyt" -> "tool=Gafgyt" [label="similar",dir="both"];"botnet=Gafgyt" -> "malpedia=Bashlite" [label="similar",dir="both"];"tool=Gafgyt" [label="tool\nGafgyt",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/40795af6-b721-11e8-9fcb-570c0b384135.png b/static/graphs/40795af6-b721-11e8-9fcb-570c0b384135.png new file mode 100644 index 0000000..0e3578f Binary files /dev/null and b/static/graphs/40795af6-b721-11e8-9fcb-570c0b384135.png differ diff --git a/static/graphs/40bce827-4049-46e4-8323-3ab58f0f00bc b/static/graphs/40bce827-4049-46e4-8323-3ab58f0f00bc new file mode 100644 index 0000000..9a29f78 --- /dev/null +++ b/static/graphs/40bce827-4049-46e4-8323-3ab58f0f00bc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Rurktar" [label="rat\nRurktar",shape=box,style=filled,color=deepskyblue];"rat=Rurktar" -> "malpedia=Rurktar" [label="similar",dir="both"];} diff --git a/static/graphs/40bce827-4049-46e4-8323-3ab58f0f00bc.png b/static/graphs/40bce827-4049-46e4-8323-3ab58f0f00bc.png new file mode 100644 index 0000000..e92b360 Binary files /dev/null and b/static/graphs/40bce827-4049-46e4-8323-3ab58f0f00bc.png differ diff --git a/static/graphs/40d3e230-ed32-469f-ba89-be70cc08ab39 b/static/graphs/40d3e230-ed32-469f-ba89-be70cc08ab39 new file mode 100644 index 0000000..3e3e795 --- /dev/null +++ b/static/graphs/40d3e230-ed32-469f-ba89-be70cc08ab39 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Agent.btz - S0092" [label="mitre-enterprise-attack-malware\nAgent.btz - S0092",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Agent.btz - S0092" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/40d3e230-ed32-469f-ba89-be70cc08ab39.png b/static/graphs/40d3e230-ed32-469f-ba89-be70cc08ab39.png new file mode 100644 index 0000000..53c5635 Binary files /dev/null and b/static/graphs/40d3e230-ed32-469f-ba89-be70cc08ab39.png differ diff --git a/static/graphs/414dc555-c79e-4b24-a2da-9b607f7eaf16 b/static/graphs/414dc555-c79e-4b24-a2da-9b607f7eaf16 new file mode 100644 index 0000000..e8ccb63 --- /dev/null +++ b/static/graphs/414dc555-c79e-4b24-a2da-9b607f7eaf16 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=SLOWDRIFT - S0218" [label="mitre-enterprise-attack-malware\nSLOWDRIFT - S0218",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SLOWDRIFT - S0218" -> "tool=SLOWDRIFT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=SLOWDRIFT - S0218" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];"tool=SLOWDRIFT" [label="tool\nSLOWDRIFT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/414dc555-c79e-4b24-a2da-9b607f7eaf16.png b/static/graphs/414dc555-c79e-4b24-a2da-9b607f7eaf16.png new file mode 100644 index 0000000..bdf8411 Binary files /dev/null and b/static/graphs/414dc555-c79e-4b24-a2da-9b607f7eaf16.png differ diff --git a/static/graphs/415a3667-4ac4-4718-a6ea-617540a4abb1 b/static/graphs/415a3667-4ac4-4718-a6ea-617540a4abb1 new file mode 100644 index 0000000..bb0220c --- /dev/null +++ b/static/graphs/415a3667-4ac4-4718-a6ea-617540a4abb1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Torpig" [label="botnet\nTorpig",shape=box,style=filled,color=deepskyblue];"botnet=Torpig" -> "malpedia=Sinowal" [label="similar",dir="both"];} diff --git a/static/graphs/415a3667-4ac4-4718-a6ea-617540a4abb1.png b/static/graphs/415a3667-4ac4-4718-a6ea-617540a4abb1.png new file mode 100644 index 0000000..61632be Binary files /dev/null and b/static/graphs/415a3667-4ac4-4718-a6ea-617540a4abb1.png differ diff --git a/static/graphs/4189a679-72ed-4a89-a57c-7f689712ecf8 b/static/graphs/4189a679-72ed-4a89-a57c-7f689712ecf8 new file mode 100644 index 0000000..b274a85 --- /dev/null +++ b/static/graphs/4189a679-72ed-4a89-a57c-7f689712ecf8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=SHUTTERSPEED - S0217" [label="mitre-enterprise-attack-malware\nSHUTTERSPEED - S0217",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SHUTTERSPEED - S0217" -> "tool=SHUTTERSPEED" [label="similar",dir="both"];"mitre-enterprise-attack-malware=SHUTTERSPEED - S0217" -> "mitre-enterprise-attack-attack-pattern=Screen Capture - T1113" [label="uses",];"tool=SHUTTERSPEED" [label="tool\nSHUTTERSPEED",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/4189a679-72ed-4a89-a57c-7f689712ecf8.png b/static/graphs/4189a679-72ed-4a89-a57c-7f689712ecf8.png new file mode 100644 index 0000000..eff0fc8 Binary files /dev/null and b/static/graphs/4189a679-72ed-4a89-a57c-7f689712ecf8.png differ diff --git a/static/graphs/41cff8e9-fd05-408e-b3d5-d98c54c20bcf b/static/graphs/41cff8e9-fd05-408e-b3d5-d98c54c20bcf new file mode 100644 index 0000000..1399424 --- /dev/null +++ b/static/graphs/41cff8e9-fd05-408e-b3d5-d98c54c20bcf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=SSH Hijacking Mitigation - T1184" [label="mitre-enterprise-attack-course-of-action\nSSH Hijacking Mitigation - T1184",shape=ellipse];"mitre-enterprise-attack-course-of-action=SSH Hijacking Mitigation - T1184" -> "mitre-enterprise-attack-attack-pattern=SSH Hijacking - T1184" [label="mitigates",];} diff --git a/static/graphs/41cff8e9-fd05-408e-b3d5-d98c54c20bcf.png b/static/graphs/41cff8e9-fd05-408e-b3d5-d98c54c20bcf.png new file mode 100644 index 0000000..fc78400 Binary files /dev/null and b/static/graphs/41cff8e9-fd05-408e-b3d5-d98c54c20bcf.png differ diff --git a/static/graphs/41d393ee-a8ee-4a9d-b510-e1b6a59054f9 b/static/graphs/41d393ee-a8ee-4a9d-b510-e1b6a59054f9 new file mode 100644 index 0000000..80b37ad --- /dev/null +++ b/static/graphs/41d393ee-a8ee-4a9d-b510-e1b6a59054f9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Error" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/41d393ee-a8ee-4a9d-b510-e1b6a59054f9.png b/static/graphs/41d393ee-a8ee-4a9d-b510-e1b6a59054f9.png new file mode 100644 index 0000000..6d26a60 Binary files /dev/null and b/static/graphs/41d393ee-a8ee-4a9d-b510-e1b6a59054f9.png differ diff --git a/static/graphs/41e3fd01-7b83-471f-835d-d2b1dc9a770c b/static/graphs/41e3fd01-7b83-471f-835d-d2b1dc9a770c new file mode 100644 index 0000000..c1fa466 --- /dev/null +++ b/static/graphs/41e3fd01-7b83-471f-835d-d2b1dc9a770c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=Twitoor - MOB-S0018" [label="mitre-mobile-attack-malware\nTwitoor - MOB-S0018",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Twitoor - MOB-S0018" -> "mitre-mobile-attack-attack-pattern=Standard Application Layer Protocol - MOB-T1040" [label="uses",];"mitre-mobile-attack-malware=Twitoor - MOB-S0018" -> "mitre-enterprise-attack-attack-pattern=Web Service - T1102" [label="uses",];} diff --git a/static/graphs/41e3fd01-7b83-471f-835d-d2b1dc9a770c.png b/static/graphs/41e3fd01-7b83-471f-835d-d2b1dc9a770c.png new file mode 100644 index 0000000..ba46f09 Binary files /dev/null and b/static/graphs/41e3fd01-7b83-471f-835d-d2b1dc9a770c.png differ diff --git a/static/graphs/41f45758-0376-42a8-bc07-8f2ffbee3ad2 b/static/graphs/41f45758-0376-42a8-bc07-8f2ffbee3ad2 new file mode 100644 index 0000000..ed54ab2 --- /dev/null +++ b/static/graphs/41f45758-0376-42a8-bc07-8f2ffbee3ad2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Bozok" [label="rat\nBozok",shape=box,style=filled,color=deepskyblue];"rat=Bozok" -> "malpedia=Bozok" [label="similar",dir="both"];} diff --git a/static/graphs/41f45758-0376-42a8-bc07-8f2ffbee3ad2.png b/static/graphs/41f45758-0376-42a8-bc07-8f2ffbee3ad2.png new file mode 100644 index 0000000..d406728 Binary files /dev/null and b/static/graphs/41f45758-0376-42a8-bc07-8f2ffbee3ad2.png differ diff --git a/static/graphs/42148074-196b-4f8c-b149-12163fc385fa b/static/graphs/42148074-196b-4f8c-b149-12163fc385fa new file mode 100644 index 0000000..e6d6100 --- /dev/null +++ b/static/graphs/42148074-196b-4f8c-b149-12163fc385fa @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Wadhrama" [label="ransomware\nWadhrama",shape=box,style=filled,color=deepskyblue];"ransomware=Wadhrama" -> "microsoft-activity-group=PARINACOTA" [label="used-by",];"microsoft-activity-group=PARINACOTA" [label="microsoft-activity-group\nPARINACOTA",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=PARINACOTA" -> "ransomware=Wadhrama" [label="uses",];} diff --git a/static/graphs/42148074-196b-4f8c-b149-12163fc385fa.png b/static/graphs/42148074-196b-4f8c-b149-12163fc385fa.png new file mode 100644 index 0000000..646899b Binary files /dev/null and b/static/graphs/42148074-196b-4f8c-b149-12163fc385fa.png differ diff --git a/static/graphs/426ead34-b3e6-45c7-ba22-5b8f3b8214bd b/static/graphs/426ead34-b3e6-45c7-ba22-5b8f3b8214bd new file mode 100644 index 0000000..5d6bab7 --- /dev/null +++ b/static/graphs/426ead34-b3e6-45c7-ba22-5b8f3b8214bd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=Svpeng" [label="android\nSvpeng",shape=box,style=filled,color=deepskyblue];"android=Svpeng" -> "tool=Svpeng" [label="similar",dir="both"];"android=Svpeng" -> "malpedia=Svpeng" [label="similar",dir="both"];"tool=Svpeng" [label="tool\nSvpeng",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/426ead34-b3e6-45c7-ba22-5b8f3b8214bd.png b/static/graphs/426ead34-b3e6-45c7-ba22-5b8f3b8214bd.png new file mode 100644 index 0000000..e884449 Binary files /dev/null and b/static/graphs/426ead34-b3e6-45c7-ba22-5b8f3b8214bd.png differ diff --git a/static/graphs/42a97a5d-ee33-492a-b20f-758ecdbf1aed b/static/graphs/42a97a5d-ee33-492a-b20f-758ecdbf1aed new file mode 100644 index 0000000..2092dc7 --- /dev/null +++ b/static/graphs/42a97a5d-ee33-492a-b20f-758ecdbf1aed @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Predator Pain" [label="rat\nPredator Pain",shape=box,style=filled,color=deepskyblue];"rat=Predator Pain" -> "malpedia=HawkEye Keylogger" [label="similar",dir="both"];} diff --git a/static/graphs/42a97a5d-ee33-492a-b20f-758ecdbf1aed.png b/static/graphs/42a97a5d-ee33-492a-b20f-758ecdbf1aed.png new file mode 100644 index 0000000..6166f17 Binary files /dev/null and b/static/graphs/42a97a5d-ee33-492a-b20f-758ecdbf1aed.png differ diff --git a/static/graphs/42be2a84-5a5c-4c6d-9864-3f09d75bb0ba b/static/graphs/42be2a84-5a5c-4c6d-9864-3f09d75bb0ba new file mode 100644 index 0000000..430b4f4 --- /dev/null +++ b/static/graphs/42be2a84-5a5c-4c6d-9864-3f09d75bb0ba @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=Cutting Kitten" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=Cleaver" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=Clever Kitten" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=CHRYSENE" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=Flying Kitten" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=Charming Kitten" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=Rocket Kitten" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="similar",dir="both"];"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "threat-actor=Greenbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/42be2a84-5a5c-4c6d-9864-3f09d75bb0ba.png b/static/graphs/42be2a84-5a5c-4c6d-9864-3f09d75bb0ba.png new file mode 100644 index 0000000..b26ef8f Binary files /dev/null and b/static/graphs/42be2a84-5a5c-4c6d-9864-3f09d75bb0ba.png differ diff --git a/static/graphs/4320b080-9ae9-4541-9b8b-bcd0961dbbbd b/static/graphs/4320b080-9ae9-4541-9b8b-bcd0961dbbbd new file mode 100644 index 0000000..07ed9a8 --- /dev/null +++ b/static/graphs/4320b080-9ae9-4541-9b8b-bcd0961dbbbd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Data Staged Mitigation - T1074" [label="mitre-enterprise-attack-course-of-action\nData Staged Mitigation - T1074",shape=ellipse];"mitre-enterprise-attack-course-of-action=Data Staged Mitigation - T1074" -> "mitre-enterprise-attack-attack-pattern=Data Staged - T1074" [label="mitigates",];} diff --git a/static/graphs/4320b080-9ae9-4541-9b8b-bcd0961dbbbd.png b/static/graphs/4320b080-9ae9-4541-9b8b-bcd0961dbbbd.png new file mode 100644 index 0000000..96bcff3 Binary files /dev/null and b/static/graphs/4320b080-9ae9-4541-9b8b-bcd0961dbbbd.png differ diff --git a/static/graphs/43213480-78f7-4fb3-976f-d48f5f6a4c2a b/static/graphs/43213480-78f7-4fb3-976f-d48f5f6a4c2a new file mode 100644 index 0000000..7fef43e --- /dev/null +++ b/static/graphs/43213480-78f7-4fb3-976f-d48f5f6a4c2a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=FLASHFLOOD - S0036" [label="mitre-enterprise-attack-malware\nFLASHFLOOD - S0036",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=FLASHFLOOD - S0036" -> "mitre-enterprise-attack-attack-pattern=Data from Local System - T1005" [label="uses",];} diff --git a/static/graphs/43213480-78f7-4fb3-976f-d48f5f6a4c2a.png b/static/graphs/43213480-78f7-4fb3-976f-d48f5f6a4c2a.png new file mode 100644 index 0000000..6cd7707 Binary files /dev/null and b/static/graphs/43213480-78f7-4fb3-976f-d48f5f6a4c2a.png differ diff --git a/static/graphs/43894e2a-174e-4931-94a8-2296afe8f650 b/static/graphs/43894e2a-174e-4931-94a8-2296afe8f650 new file mode 100644 index 0000000..db58d3b --- /dev/null +++ b/static/graphs/43894e2a-174e-4931-94a8-2296afe8f650 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=PROMETHIUM" [label="threat-actor\nPROMETHIUM",shape=octagon,style=filled,color=indianred1];"threat-actor=PROMETHIUM" -> "mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" [label="similar",dir="both"];"threat-actor=PROMETHIUM" -> "microsoft-activity-group=PROMETHIUM" [label="similar",dir="both"];"microsoft-activity-group=PROMETHIUM" [label="microsoft-activity-group\nPROMETHIUM",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" [label="mitre-enterprise-attack-intrusion-set\nPROMETHIUM - G0056",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" -> "mitre-enterprise-attack-malware=Truvasys - S0178" [label="uses",];"mitre-enterprise-attack-malware=Truvasys - S0178" [label="mitre-enterprise-attack-malware\nTruvasys - S0178",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Truvasys - S0178" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];} diff --git a/static/graphs/43894e2a-174e-4931-94a8-2296afe8f650.png b/static/graphs/43894e2a-174e-4931-94a8-2296afe8f650.png new file mode 100644 index 0000000..81b0721 Binary files /dev/null and b/static/graphs/43894e2a-174e-4931-94a8-2296afe8f650.png differ diff --git a/static/graphs/43b366a4-b5ff-4d4e-8a3b-f09a9d2faff5 b/static/graphs/43b366a4-b5ff-4d4e-8a3b-f09a9d2faff5 new file mode 100644 index 0000000..21857a8 --- /dev/null +++ b/static/graphs/43b366a4-b5ff-4d4e-8a3b-f09a9d2faff5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Shared Webroot Mitigation - T1051" [label="mitre-enterprise-attack-course-of-action\nShared Webroot Mitigation - T1051",shape=ellipse];"mitre-enterprise-attack-course-of-action=Shared Webroot Mitigation - T1051" -> "mitre-enterprise-attack-attack-pattern=Shared Webroot - T1051" [label="mitigates",];} diff --git a/static/graphs/43b366a4-b5ff-4d4e-8a3b-f09a9d2faff5.png b/static/graphs/43b366a4-b5ff-4d4e-8a3b-f09a9d2faff5.png new file mode 100644 index 0000000..ea36bfd Binary files /dev/null and b/static/graphs/43b366a4-b5ff-4d4e-8a3b-f09a9d2faff5.png differ diff --git a/static/graphs/43cd8a09-9c80-48c8-9568-1992433af60a b/static/graphs/43cd8a09-9c80-48c8-9568-1992433af60a new file mode 100644 index 0000000..4da03d6 --- /dev/null +++ b/static/graphs/43cd8a09-9c80-48c8-9568-1992433af60a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=GAMEFISH" [label="tool\nGAMEFISH",shape=box,style=filled,color=deepskyblue];"tool=GAMEFISH" -> "mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="similar",dir="both"];"tool=GAMEFISH" -> "android=Sofacy" [label="similar",dir="both"];"tool=GAMEFISH" -> "tool=SOURFACE" [label="similar",dir="both"];"tool=GAMEFISH" -> "tool=CORESHELL" [label="similar",dir="both"];"tool=GAMEFISH" -> "mitre-enterprise-attack-malware=Komplex - S0162" [label="similar",dir="both"];"tool=GAMEFISH" -> "malpedia=Komplex" [label="similar",dir="both"];"tool=GAMEFISH" -> "malpedia=Seduploader" [label="similar",dir="both"];"android=Sofacy" [label="android\nSofacy",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" [label="mitre-enterprise-attack-malware\nKomplex - S0162",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="mitre-enterprise-attack-malware\nJHUHUGIT - S0044",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Privilege Escalation - T1068" [label="uses",];"tool=SOURFACE" [label="tool\nSOURFACE",shape=box,style=filled,color=deepskyblue];"tool=SOURFACE" -> "mitre-enterprise-attack-malware=CORESHELL - S0137" [label="similar",dir="both"];"tool=CORESHELL" [label="tool\nCORESHELL",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CORESHELL - S0137" [label="mitre-enterprise-attack-malware\nCORESHELL - S0137",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CORESHELL - S0137" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];} diff --git a/static/graphs/43cd8a09-9c80-48c8-9568-1992433af60a.png b/static/graphs/43cd8a09-9c80-48c8-9568-1992433af60a.png new file mode 100644 index 0000000..7e03d4b Binary files /dev/null and b/static/graphs/43cd8a09-9c80-48c8-9568-1992433af60a.png differ diff --git a/static/graphs/44155d14-ca75-4fdf-b033-ab3d732e2884 b/static/graphs/44155d14-ca75-4fdf-b033-ab3d732e2884 new file mode 100644 index 0000000..bca0021 --- /dev/null +++ b/static/graphs/44155d14-ca75-4fdf-b033-ab3d732e2884 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Kernel Modules and Extensions Mitigation - T1215" [label="mitre-enterprise-attack-course-of-action\nKernel Modules and Extensions Mitigation - T1215",shape=ellipse];"mitre-enterprise-attack-course-of-action=Kernel Modules and Extensions Mitigation - T1215" -> "mitre-enterprise-attack-attack-pattern=Kernel Modules and Extensions - T1215" [label="mitigates",];} diff --git a/static/graphs/44155d14-ca75-4fdf-b033-ab3d732e2884.png b/static/graphs/44155d14-ca75-4fdf-b033-ab3d732e2884.png new file mode 100644 index 0000000..865b442 Binary files /dev/null and b/static/graphs/44155d14-ca75-4fdf-b033-ab3d732e2884.png differ diff --git a/static/graphs/44754726-e1d5-4e5f-a113-234c4a8ca65e b/static/graphs/44754726-e1d5-4e5f-a113-234c4a8ca65e new file mode 100644 index 0000000..88af905 --- /dev/null +++ b/static/graphs/44754726-e1d5-4e5f-a113-234c4a8ca65e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Dridex" [label="banker\nDridex",shape=box,style=filled,color=deepskyblue];"banker=Dridex" -> "tool=Dridex" [label="similar",dir="both"];"banker=Dridex" -> "malpedia=Dridex" [label="similar",dir="both"];"tool=Dridex" [label="tool\nDridex",shape=box,style=filled,color=deepskyblue];"tool=Dridex" -> "banker=Feodo" [label="similar",dir="both"];"tool=Dridex" -> "malpedia=Feodo" [label="similar",dir="both"];"banker=Feodo" [label="banker\nFeodo",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/44754726-e1d5-4e5f-a113-234c4a8ca65e.png b/static/graphs/44754726-e1d5-4e5f-a113-234c4a8ca65e.png new file mode 100644 index 0000000..07bf0cc Binary files /dev/null and b/static/graphs/44754726-e1d5-4e5f-a113-234c4a8ca65e.png differ diff --git a/static/graphs/44909efb-7cd3-42e3-b225-9f3e96b5f362 b/static/graphs/44909efb-7cd3-42e3-b225-9f3e96b5f362 new file mode 100644 index 0000000..c266a20 --- /dev/null +++ b/static/graphs/44909efb-7cd3-42e3-b225-9f3e96b5f362 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=USBStealer" [label="tool\nUSBStealer",shape=box,style=filled,color=deepskyblue];"tool=USBStealer" -> "mitre-enterprise-attack-malware=USBStealer - S0136" [label="similar",dir="both"];"mitre-enterprise-attack-malware=USBStealer - S0136" [label="mitre-enterprise-attack-malware\nUSBStealer - S0136",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=USBStealer - S0136" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];} diff --git a/static/graphs/44909efb-7cd3-42e3-b225-9f3e96b5f362.png b/static/graphs/44909efb-7cd3-42e3-b225-9f3e96b5f362.png new file mode 100644 index 0000000..78d0d58 Binary files /dev/null and b/static/graphs/44909efb-7cd3-42e3-b225-9f3e96b5f362.png differ diff --git a/static/graphs/4490fee2-5c70-4db3-8db5-8d88767dbd55 b/static/graphs/4490fee2-5c70-4db3-8db5-8d88767dbd55 new file mode 100644 index 0000000..c8375c6 --- /dev/null +++ b/static/graphs/4490fee2-5c70-4db3-8db5-8d88767dbd55 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Credentials in Registry Mitigation - T1214" [label="mitre-enterprise-attack-course-of-action\nCredentials in Registry Mitigation - T1214",shape=ellipse];"mitre-enterprise-attack-course-of-action=Credentials in Registry Mitigation - T1214" -> "mitre-enterprise-attack-attack-pattern=Credentials in Registry - T1214" [label="mitigates",];} diff --git a/static/graphs/4490fee2-5c70-4db3-8db5-8d88767dbd55.png b/static/graphs/4490fee2-5c70-4db3-8db5-8d88767dbd55.png new file mode 100644 index 0000000..18046f3 Binary files /dev/null and b/static/graphs/4490fee2-5c70-4db3-8db5-8d88767dbd55.png differ diff --git a/static/graphs/45dcbc83-4abc-4de1-b643-e528d1e9df09 b/static/graphs/45dcbc83-4abc-4de1-b643-e528d1e9df09 new file mode 100644 index 0000000..27b3ede --- /dev/null +++ b/static/graphs/45dcbc83-4abc-4de1-b643-e528d1e9df09 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Biometric Spoofing - MOB-T1063" [label="mitre-mobile-attack-attack-pattern\nBiometric Spoofing - MOB-T1063",shape=ellipse];"mitre-mobile-attack-attack-pattern=Biometric Spoofing - MOB-T1063" -> "mitre-mobile-attack-attack-pattern=Lockscreen Bypass - MOB-T1064" [label="revoked-by",];} diff --git a/static/graphs/45dcbc83-4abc-4de1-b643-e528d1e9df09.png b/static/graphs/45dcbc83-4abc-4de1-b643-e528d1e9df09.png new file mode 100644 index 0000000..67d1d5c Binary files /dev/null and b/static/graphs/45dcbc83-4abc-4de1-b643-e528d1e9df09.png differ diff --git a/static/graphs/45e7f570-6a0b-4095-bf02-4bca05da6bae b/static/graphs/45e7f570-6a0b-4095-bf02-4bca05da6bae new file mode 100644 index 0000000..7ca603d --- /dev/null +++ b/static/graphs/45e7f570-6a0b-4095-bf02-4bca05da6bae @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Masquerading Mitigation - T1036" [label="mitre-enterprise-attack-course-of-action\nMasquerading Mitigation - T1036",shape=ellipse];"mitre-enterprise-attack-course-of-action=Masquerading Mitigation - T1036" -> "mitre-enterprise-attack-attack-pattern=Masquerading - T1036" [label="mitigates",];} diff --git a/static/graphs/45e7f570-6a0b-4095-bf02-4bca05da6bae.png b/static/graphs/45e7f570-6a0b-4095-bf02-4bca05da6bae.png new file mode 100644 index 0000000..695d764 Binary files /dev/null and b/static/graphs/45e7f570-6a0b-4095-bf02-4bca05da6bae.png differ diff --git a/static/graphs/460e3f42-15dc-4e73-ad39-76af8d272379 b/static/graphs/460e3f42-15dc-4e73-ad39-76af8d272379 new file mode 100644 index 0000000..5f54d8f --- /dev/null +++ b/static/graphs/460e3f42-15dc-4e73-ad39-76af8d272379 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=Cryptomix-SERVER" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/460e3f42-15dc-4e73-ad39-76af8d272379.png b/static/graphs/460e3f42-15dc-4e73-ad39-76af8d272379.png new file mode 100644 index 0000000..bcaa48a Binary files /dev/null and b/static/graphs/460e3f42-15dc-4e73-ad39-76af8d272379.png differ diff --git a/static/graphs/463f68f1-5cde-4dc2-a831-68b73488f8f4 b/static/graphs/463f68f1-5cde-4dc2-a831-68b73488f8f4 new file mode 100644 index 0000000..23a842d --- /dev/null +++ b/static/graphs/463f68f1-5cde-4dc2-a831-68b73488f8f4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=MobileOrder - S0079" [label="mitre-enterprise-attack-malware\nMobileOrder - S0079",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=MobileOrder - S0079" -> "mitre-enterprise-attack-attack-pattern=Standard Cryptographic Protocol - T1032" [label="uses",];} diff --git a/static/graphs/463f68f1-5cde-4dc2-a831-68b73488f8f4.png b/static/graphs/463f68f1-5cde-4dc2-a831-68b73488f8f4.png new file mode 100644 index 0000000..1c0d5a0 Binary files /dev/null and b/static/graphs/463f68f1-5cde-4dc2-a831-68b73488f8f4.png differ diff --git a/static/graphs/4664b683-f578-434f-919b-1c1aad2a1111 b/static/graphs/4664b683-f578-434f-919b-1c1aad2a1111 new file mode 100644 index 0000000..c07757c --- /dev/null +++ b/static/graphs/4664b683-f578-434f-919b-1c1aad2a1111 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=netstat - S0104" [label="mitre-enterprise-attack-tool\nnetstat - S0104",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=netstat - S0104" -> "mitre-enterprise-attack-attack-pattern=System Network Connections Discovery - T1049" [label="uses",];} diff --git a/static/graphs/4664b683-f578-434f-919b-1c1aad2a1111.png b/static/graphs/4664b683-f578-434f-919b-1c1aad2a1111.png new file mode 100644 index 0000000..02c429f Binary files /dev/null and b/static/graphs/4664b683-f578-434f-919b-1c1aad2a1111.png differ diff --git a/static/graphs/46670c51-fea4-45d6-bdd4-62e85a5c7404 b/static/graphs/46670c51-fea4-45d6-bdd4-62e85a5c7404 new file mode 100644 index 0000000..109ae19 --- /dev/null +++ b/static/graphs/46670c51-fea4-45d6-bdd4-62e85a5c7404 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=TERBIUM" [label="threat-actor\nTERBIUM",shape=octagon,style=filled,color=indianred1];"threat-actor=TERBIUM" -> "microsoft-activity-group=TERBIUM" [label="similar",dir="both"];"microsoft-activity-group=TERBIUM" [label="microsoft-activity-group\nTERBIUM",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/46670c51-fea4-45d6-bdd4-62e85a5c7404.png b/static/graphs/46670c51-fea4-45d6-bdd4-62e85a5c7404.png new file mode 100644 index 0000000..6c1e983 Binary files /dev/null and b/static/graphs/46670c51-fea4-45d6-bdd4-62e85a5c7404.png differ diff --git a/static/graphs/4689b9fb-dca4-473e-831b-34717ad50c97 b/static/graphs/4689b9fb-dca4-473e-831b-34717ad50c97 new file mode 100644 index 0000000..2ca6762 --- /dev/null +++ b/static/graphs/4689b9fb-dca4-473e-831b-34717ad50c97 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Web Service Mitigation - T1102" [label="mitre-enterprise-attack-course-of-action\nWeb Service Mitigation - T1102",shape=ellipse];"mitre-enterprise-attack-course-of-action=Web Service Mitigation - T1102" -> "mitre-enterprise-attack-attack-pattern=Web Service - T1102" [label="mitigates",];} diff --git a/static/graphs/4689b9fb-dca4-473e-831b-34717ad50c97.png b/static/graphs/4689b9fb-dca4-473e-831b-34717ad50c97.png new file mode 100644 index 0000000..d9a5f8b Binary files /dev/null and b/static/graphs/4689b9fb-dca4-473e-831b-34717ad50c97.png differ diff --git a/static/graphs/46b7ef91-4e1d-43c5-a2eb-00fa9444f6f4 b/static/graphs/46b7ef91-4e1d-43c5-a2eb-00fa9444f6f4 new file mode 100644 index 0000000..670c23e --- /dev/null +++ b/static/graphs/46b7ef91-4e1d-43c5-a2eb-00fa9444f6f4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Network Sniffing Mitigation - T1040" [label="mitre-enterprise-attack-course-of-action\nNetwork Sniffing Mitigation - T1040",shape=ellipse];"mitre-enterprise-attack-course-of-action=Network Sniffing Mitigation - T1040" -> "mitre-enterprise-attack-attack-pattern=Network Sniffing - T1040" [label="mitigates",];} diff --git a/static/graphs/46b7ef91-4e1d-43c5-a2eb-00fa9444f6f4.png b/static/graphs/46b7ef91-4e1d-43c5-a2eb-00fa9444f6f4.png new file mode 100644 index 0000000..c7c3bfd Binary files /dev/null and b/static/graphs/46b7ef91-4e1d-43c5-a2eb-00fa9444f6f4.png differ diff --git a/static/graphs/47204403-34c9-4d25-a006-296a0939d1a2 b/static/graphs/47204403-34c9-4d25-a006-296a0939d1a2 new file mode 100644 index 0000000..85cf194 --- /dev/null +++ b/static/graphs/47204403-34c9-4d25-a006-296a0939d1a2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"threat-actor=Greenbug" -> "threat-actor=CHRYSENE" [label="similar",dir="both"];"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Cutting Kitten" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Cleaver" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=OilRig" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Clever Kitten" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Flying Kitten" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Charming Kitten" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Rocket Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="similar",dir="both"];"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/47204403-34c9-4d25-a006-296a0939d1a2.png b/static/graphs/47204403-34c9-4d25-a006-296a0939d1a2.png new file mode 100644 index 0000000..e38ded7 Binary files /dev/null and b/static/graphs/47204403-34c9-4d25-a006-296a0939d1a2.png differ diff --git a/static/graphs/47b5007a-3fb1-466a-9578-629e6e735493 b/static/graphs/47b5007a-3fb1-466a-9578-629e6e735493 new file mode 100644 index 0000000..fe29310 --- /dev/null +++ b/static/graphs/47b5007a-3fb1-466a-9578-629e6e735493 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"microsoft-activity-group=NEODYMIUM" [label="microsoft-activity-group\nNEODYMIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=NEODYMIUM" -> "mitre-enterprise-attack-intrusion-set=NEODYMIUM - G0055" [label="similar",dir="both"];"microsoft-activity-group=NEODYMIUM" -> "threat-actor=NEODYMIUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=NEODYMIUM - G0055" [label="mitre-enterprise-attack-intrusion-set\nNEODYMIUM - G0055",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=NEODYMIUM - G0055" -> "mitre-enterprise-attack-malware=Wingbird - S0176" [label="uses",];"threat-actor=NEODYMIUM" [label="threat-actor\nNEODYMIUM",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=Wingbird - S0176" [label="mitre-enterprise-attack-malware\nWingbird - S0176",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Wingbird - S0176" -> "mitre-enterprise-attack-attack-pattern=DLL Side-Loading - T1073" [label="uses",];} diff --git a/static/graphs/47b5007a-3fb1-466a-9578-629e6e735493.png b/static/graphs/47b5007a-3fb1-466a-9578-629e6e735493.png new file mode 100644 index 0000000..4bb6ee2 Binary files /dev/null and b/static/graphs/47b5007a-3fb1-466a-9578-629e6e735493.png differ diff --git a/static/graphs/48146604-6693-4db1-bd94-159744726514 b/static/graphs/48146604-6693-4db1-bd94-159744726514 new file mode 100644 index 0000000..dc7321d --- /dev/null +++ b/static/graphs/48146604-6693-4db1-bd94-159744726514 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=IXESHE" [label="threat-actor\nIXESHE",shape=octagon,style=filled,color=indianred1];"threat-actor=IXESHE" -> "mitre-pre-attack-intrusion-set=APT12 - G0005" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT12 - G0005" [label="mitre-enterprise-attack-intrusion-set\nAPT12 - G0005",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT12 - G0005" [label="mitre-pre-attack-intrusion-set\nAPT12 - G0005",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT12 - G0005" -> "mitre-enterprise-attack-malware=Ixeshe - S0015" [label="uses",];"mitre-pre-attack-intrusion-set=APT12 - G0005" -> "mitre-enterprise-attack-malware=RIPTIDE - S0003" [label="uses",];"mitre-pre-attack-intrusion-set=APT12 - G0005" -> "mitre-enterprise-attack-attack-pattern=Web Service - T1102" [label="uses",];"mitre-enterprise-attack-malware=Ixeshe - S0015" [label="mitre-enterprise-attack-malware\nIxeshe - S0015",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Ixeshe - S0015" -> "mitre-enterprise-attack-attack-pattern=Data Obfuscation - T1001" [label="uses",];"mitre-enterprise-attack-malware=RIPTIDE - S0003" [label="mitre-enterprise-attack-malware\nRIPTIDE - S0003",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RIPTIDE - S0003" -> "tool=Etumbot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RIPTIDE - S0003" -> "mitre-enterprise-attack-attack-pattern=Commonly Used Port - T1043" [label="uses",];"tool=Etumbot" [label="tool\nEtumbot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/48146604-6693-4db1-bd94-159744726514.png b/static/graphs/48146604-6693-4db1-bd94-159744726514.png new file mode 100644 index 0000000..6e6c152 Binary files /dev/null and b/static/graphs/48146604-6693-4db1-bd94-159744726514.png differ diff --git a/static/graphs/48523614-309e-43bf-a2b8-705c2b45d7b2 b/static/graphs/48523614-309e-43bf-a2b8-705c2b45d7b2 new file mode 100644 index 0000000..728799c --- /dev/null +++ b/static/graphs/48523614-309e-43bf-a2b8-705c2b45d7b2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Naid - S0205" [label="mitre-enterprise-attack-malware\nNaid - S0205",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Naid - S0205" -> "tool=Trojan.Naid" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Naid - S0205" -> "mitre-enterprise-attack-attack-pattern=Modify Registry - T1112" [label="uses",];"tool=Trojan.Naid" [label="tool\nTrojan.Naid",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/48523614-309e-43bf-a2b8-705c2b45d7b2.png b/static/graphs/48523614-309e-43bf-a2b8-705c2b45d7b2.png new file mode 100644 index 0000000..ed8d86a Binary files /dev/null and b/static/graphs/48523614-309e-43bf-a2b8-705c2b45d7b2.png differ diff --git a/static/graphs/4859330d-c6a5-4b9c-b45b-536ec983cd4a b/static/graphs/4859330d-c6a5-4b9c-b45b-536ec983cd4a new file mode 100644 index 0000000..80e9069 --- /dev/null +++ b/static/graphs/4859330d-c6a5-4b9c-b45b-536ec983cd4a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Pirpi" [label="tool\nPirpi",shape=box,style=filled,color=deepskyblue];"tool=Pirpi" -> "mitre-enterprise-attack-malware=SHOTPUT - S0063" [label="similar",dir="both"];"mitre-enterprise-attack-malware=SHOTPUT - S0063" [label="mitre-enterprise-attack-malware\nSHOTPUT - S0063",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SHOTPUT - S0063" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];} diff --git a/static/graphs/4859330d-c6a5-4b9c-b45b-536ec983cd4a.png b/static/graphs/4859330d-c6a5-4b9c-b45b-536ec983cd4a.png new file mode 100644 index 0000000..af733e6 Binary files /dev/null and b/static/graphs/4859330d-c6a5-4b9c-b45b-536ec983cd4a.png differ diff --git a/static/graphs/488da8ed-2887-4ef6-a39a-5b69bc6682c6 b/static/graphs/488da8ed-2887-4ef6-a39a-5b69bc6682c6 new file mode 100644 index 0000000..cafd701 --- /dev/null +++ b/static/graphs/488da8ed-2887-4ef6-a39a-5b69bc6682c6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party software services - PRE-T1107" [label="mitre-pre-attack-attack-pattern\nAcquire and/or use 3rd party software services - PRE-T1107",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party software services - PRE-T1107" -> "mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party software services - PRE-T1085" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party software services - PRE-T1085" [label="mitre-pre-attack-attack-pattern\nAcquire and/or use 3rd party software services - PRE-T1085",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party software services - PRE-T1085" -> "mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party software services - PRE-T1107" [label="related-to",];} diff --git a/static/graphs/488da8ed-2887-4ef6-a39a-5b69bc6682c6.png b/static/graphs/488da8ed-2887-4ef6-a39a-5b69bc6682c6.png new file mode 100644 index 0000000..629d290 Binary files /dev/null and b/static/graphs/488da8ed-2887-4ef6-a39a-5b69bc6682c6.png differ diff --git a/static/graphs/4900fabf-1142-4c1f-92f5-0b590e049077 b/static/graphs/4900fabf-1142-4c1f-92f5-0b590e049077 new file mode 100644 index 0000000..46c40ef --- /dev/null +++ b/static/graphs/4900fabf-1142-4c1f-92f5-0b590e049077 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Compromise 3rd party infrastructure to support delivery - PRE-T1089" [label="mitre-pre-attack-attack-pattern\nCompromise 3rd party infrastructure to support delivery - PRE-T1089",shape=ellipse];"mitre-pre-attack-attack-pattern=Compromise 3rd party infrastructure to support delivery - PRE-T1089" -> "mitre-pre-attack-attack-pattern=Compromise 3rd party infrastructure to support delivery - PRE-T1111" [label="related-to",];"mitre-pre-attack-attack-pattern=Compromise 3rd party infrastructure to support delivery - PRE-T1111" [label="mitre-pre-attack-attack-pattern\nCompromise 3rd party infrastructure to support delivery - PRE-T1111",shape=ellipse];"mitre-pre-attack-attack-pattern=Compromise 3rd party infrastructure to support delivery - PRE-T1111" -> "mitre-pre-attack-attack-pattern=Compromise 3rd party infrastructure to support delivery - PRE-T1089" [label="related-to",];} diff --git a/static/graphs/4900fabf-1142-4c1f-92f5-0b590e049077.png b/static/graphs/4900fabf-1142-4c1f-92f5-0b590e049077.png new file mode 100644 index 0000000..254d1c6 Binary files /dev/null and b/static/graphs/4900fabf-1142-4c1f-92f5-0b590e049077.png differ diff --git a/static/graphs/49025073-4cd3-43b8-b893-e80a1d3adc04 b/static/graphs/49025073-4cd3-43b8-b893-e80a1d3adc04 new file mode 100644 index 0000000..6663417 --- /dev/null +++ b/static/graphs/49025073-4cd3-43b8-b893-e80a1d3adc04 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=WINERACK" [label="tool\nWINERACK",shape=box,style=filled,color=deepskyblue];"tool=WINERACK" -> "mitre-enterprise-attack-malware=WINERACK - S0219" [label="similar",dir="both"];"mitre-enterprise-attack-malware=WINERACK - S0219" [label="mitre-enterprise-attack-malware\nWINERACK - S0219",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=WINERACK - S0219" -> "mitre-enterprise-attack-attack-pattern=Application Window Discovery - T1010" [label="uses",];} diff --git a/static/graphs/49025073-4cd3-43b8-b893-e80a1d3adc04.png b/static/graphs/49025073-4cd3-43b8-b893-e80a1d3adc04.png new file mode 100644 index 0000000..be8c270 Binary files /dev/null and b/static/graphs/49025073-4cd3-43b8-b893-e80a1d3adc04.png differ diff --git a/static/graphs/495b6cdb-7b5a-4fbc-8d33-e7ef68806d08 b/static/graphs/495b6cdb-7b5a-4fbc-8d33-e7ef68806d08 new file mode 100644 index 0000000..7e8fc9a --- /dev/null +++ b/static/graphs/495b6cdb-7b5a-4fbc-8d33-e7ef68806d08 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Volgmer - S0180" [label="mitre-enterprise-attack-malware\nVolgmer - S0180",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Volgmer - S0180" -> "tool=Volgmer" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Volgmer - S0180" -> "malpedia=Volgmer" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Volgmer - S0180" -> "mitre-enterprise-attack-attack-pattern=Standard Cryptographic Protocol - T1032" [label="uses",];"tool=Volgmer" [label="tool\nVolgmer",shape=box,style=filled,color=deepskyblue];"tool=Volgmer" -> "rat=FALLCHILL" [label="similar",dir="both"];"tool=Volgmer" -> "mitre-enterprise-attack-malware=FALLCHILL - S0181" [label="similar",dir="both"];"mitre-enterprise-attack-malware=FALLCHILL - S0181" [label="mitre-enterprise-attack-malware\nFALLCHILL - S0181",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=FALLCHILL - S0181" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];"rat=FALLCHILL" [label="rat\nFALLCHILL",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/495b6cdb-7b5a-4fbc-8d33-e7ef68806d08.png b/static/graphs/495b6cdb-7b5a-4fbc-8d33-e7ef68806d08.png new file mode 100644 index 0000000..7c71f91 Binary files /dev/null and b/static/graphs/495b6cdb-7b5a-4fbc-8d33-e7ef68806d08.png differ diff --git a/static/graphs/49961e75-b493-423a-9ec7-ac2d6f55384a b/static/graphs/49961e75-b493-423a-9ec7-ac2d6f55384a new file mode 100644 index 0000000..37b06f5 --- /dev/null +++ b/static/graphs/49961e75-b493-423a-9ec7-ac2d6f55384a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Password Policy Discovery Mitigation - T1201" [label="mitre-enterprise-attack-course-of-action\nPassword Policy Discovery Mitigation - T1201",shape=ellipse];"mitre-enterprise-attack-course-of-action=Password Policy Discovery Mitigation - T1201" -> "mitre-enterprise-attack-attack-pattern=Password Policy Discovery - T1201" [label="mitigates",];} diff --git a/static/graphs/49961e75-b493-423a-9ec7-ac2d6f55384a.png b/static/graphs/49961e75-b493-423a-9ec7-ac2d6f55384a.png new file mode 100644 index 0000000..4b5007d Binary files /dev/null and b/static/graphs/49961e75-b493-423a-9ec7-ac2d6f55384a.png differ diff --git a/static/graphs/49abab73-3c5c-476e-afd5-69b5c732d845 b/static/graphs/49abab73-3c5c-476e-afd5-69b5c732d845 new file mode 100644 index 0000000..97d006b --- /dev/null +++ b/static/graphs/49abab73-3c5c-476e-afd5-69b5c732d845 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=WINERACK - S0219" [label="mitre-enterprise-attack-malware\nWINERACK - S0219",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=WINERACK - S0219" -> "tool=WINERACK" [label="similar",dir="both"];"mitre-enterprise-attack-malware=WINERACK - S0219" -> "mitre-enterprise-attack-attack-pattern=Application Window Discovery - T1010" [label="uses",];"tool=WINERACK" [label="tool\nWINERACK",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/49abab73-3c5c-476e-afd5-69b5c732d845.png b/static/graphs/49abab73-3c5c-476e-afd5-69b5c732d845.png new file mode 100644 index 0000000..800c82e Binary files /dev/null and b/static/graphs/49abab73-3c5c-476e-afd5-69b5c732d845.png differ diff --git a/static/graphs/4a2ce82e-1a74-468a-a6fb-bbead541383c b/static/graphs/4a2ce82e-1a74-468a-a6fb-bbead541383c new file mode 100644 index 0000000..9ccf97b --- /dev/null +++ b/static/graphs/4a2ce82e-1a74-468a-a6fb-bbead541383c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=APT37 - G0067" [label="mitre-enterprise-attack-intrusion-set\nAPT37 - G0067",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT37 - G0067" -> "threat-actor=APT37" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT37 - G0067" -> "mitre-enterprise-attack-attack-pattern=Custom Command and Control Protocol - T1094" [label="uses",];"threat-actor=APT37" [label="threat-actor\nAPT37",shape=octagon,style=filled,color=indianred1];"threat-actor=APT37" -> "threat-actor=Lazarus Group" [label="linked-to",];"threat-actor=Lazarus Group" [label="threat-actor\nLazarus Group",shape=octagon,style=filled,color=indianred1];"threat-actor=Lazarus Group" -> "mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" [label="similar",dir="both"];"threat-actor=Lazarus Group" -> "threat-actor=Operation Sharpshooter" [label="similar",dir="both"];"threat-actor=Lazarus Group" -> "threat-actor=APT37" [label="linked-to",];"mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" [label="mitre-enterprise-attack-intrusion-set\nLazarus Group - G0032",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" -> "mitre-enterprise-attack-attack-pattern=Windows Admin Shares - T1077" [label="uses",];"threat-actor=Operation Sharpshooter" [label="threat-actor\nOperation Sharpshooter",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/4a2ce82e-1a74-468a-a6fb-bbead541383c.png b/static/graphs/4a2ce82e-1a74-468a-a6fb-bbead541383c.png new file mode 100644 index 0000000..dee31b2 Binary files /dev/null and b/static/graphs/4a2ce82e-1a74-468a-a6fb-bbead541383c.png differ diff --git a/static/graphs/4a99fecc-680b-448e-8fe7-8144c60d272c b/static/graphs/4a99fecc-680b-448e-8fe7-8144c60d272c new file mode 100644 index 0000000..04983d7 --- /dev/null +++ b/static/graphs/4a99fecc-680b-448e-8fe7-8144c60d272c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Brute Force Mitigation - T1110" [label="mitre-enterprise-attack-course-of-action\nBrute Force Mitigation - T1110",shape=ellipse];"mitre-enterprise-attack-course-of-action=Brute Force Mitigation - T1110" -> "mitre-enterprise-attack-attack-pattern=Brute Force - T1110" [label="mitigates",];} diff --git a/static/graphs/4a99fecc-680b-448e-8fe7-8144c60d272c.png b/static/graphs/4a99fecc-680b-448e-8fe7-8144c60d272c.png new file mode 100644 index 0000000..a46cfc8 Binary files /dev/null and b/static/graphs/4a99fecc-680b-448e-8fe7-8144c60d272c.png differ diff --git a/static/graphs/4ab44516-ad75-4e43-a280-705dc0420e2f b/static/graphs/4ab44516-ad75-4e43-a280-705dc0420e2f new file mode 100644 index 0000000..55c2e7d --- /dev/null +++ b/static/graphs/4ab44516-ad75-4e43-a280-705dc0420e2f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=ZeroT - S0230" [label="mitre-enterprise-attack-malware\nZeroT - S0230",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ZeroT - S0230" -> "tool=ZeroT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ZeroT - S0230" -> "malpedia=ZeroT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ZeroT - S0230" -> "mitre-enterprise-attack-attack-pattern=Standard Cryptographic Protocol - T1032" [label="uses",];"tool=ZeroT" [label="tool\nZeroT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/4ab44516-ad75-4e43-a280-705dc0420e2f.png b/static/graphs/4ab44516-ad75-4e43-a280-705dc0420e2f.png new file mode 100644 index 0000000..f50477b Binary files /dev/null and b/static/graphs/4ab44516-ad75-4e43-a280-705dc0420e2f.png differ diff --git a/static/graphs/4b62ab58-c23b-4704-9c15-edd568cd59f8 b/static/graphs/4b62ab58-c23b-4704-9c15-edd568cd59f8 new file mode 100644 index 0000000..9b200f4 --- /dev/null +++ b/static/graphs/4b62ab58-c23b-4704-9c15-edd568cd59f8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Hacking Team UEFI Rootkit - S0047" [label="mitre-enterprise-attack-malware\nHacking Team UEFI Rootkit - S0047",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Hacking Team UEFI Rootkit - S0047" -> "mitre-enterprise-attack-attack-pattern=Rootkit - T1014" [label="uses",];} diff --git a/static/graphs/4b62ab58-c23b-4704-9c15-edd568cd59f8.png b/static/graphs/4b62ab58-c23b-4704-9c15-edd568cd59f8.png new file mode 100644 index 0000000..6ad10b1 Binary files /dev/null and b/static/graphs/4b62ab58-c23b-4704-9c15-edd568cd59f8.png differ diff --git a/static/graphs/4b998a71-7b8f-4dcc-8f3f-277f2e740271 b/static/graphs/4b998a71-7b8f-4dcc-8f3f-277f2e740271 new file mode 100644 index 0000000..7f3094b --- /dev/null +++ b/static/graphs/4b998a71-7b8f-4dcc-8f3f-277f2e740271 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Indicator Removal from Tools Mitigation - T1066" [label="mitre-enterprise-attack-course-of-action\nIndicator Removal from Tools Mitigation - T1066",shape=ellipse];"mitre-enterprise-attack-course-of-action=Indicator Removal from Tools Mitigation - T1066" -> "mitre-enterprise-attack-attack-pattern=Indicator Removal from Tools - T1066" [label="mitigates",];} diff --git a/static/graphs/4b998a71-7b8f-4dcc-8f3f-277f2e740271.png b/static/graphs/4b998a71-7b8f-4dcc-8f3f-277f2e740271.png new file mode 100644 index 0000000..8ff27fa Binary files /dev/null and b/static/graphs/4b998a71-7b8f-4dcc-8f3f-277f2e740271.png differ diff --git a/static/graphs/4bb11db7-17a0-4536-b817-419ae6299004 b/static/graphs/4bb11db7-17a0-4536-b817-419ae6299004 new file mode 100644 index 0000000..56035a1 --- /dev/null +++ b/static/graphs/4bb11db7-17a0-4536-b817-419ae6299004 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Owl" [label="ransomware\nOwl",shape=box,style=filled,color=deepskyblue];"ransomware=Owl" -> "malpedia=CryptoWire" [label="similar",dir="both"];} diff --git a/static/graphs/4bb11db7-17a0-4536-b817-419ae6299004.png b/static/graphs/4bb11db7-17a0-4536-b817-419ae6299004.png new file mode 100644 index 0000000..fea1e3d Binary files /dev/null and b/static/graphs/4bb11db7-17a0-4536-b817-419ae6299004.png differ diff --git a/static/graphs/4bf6ba32-4165-42c1-b911-9c36165891c8 b/static/graphs/4bf6ba32-4165-42c1-b911-9c36165891c8 new file mode 100644 index 0000000..5848505 --- /dev/null +++ b/static/graphs/4bf6ba32-4165-42c1-b911-9c36165891c8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=ANDROIDOS_ANSERVER.A - MOB-S0026" [label="mitre-mobile-attack-malware\nANDROIDOS_ANSERVER.A - MOB-S0026",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=ANDROIDOS_ANSERVER.A - MOB-S0026" -> "mitre-mobile-attack-attack-pattern=Standard Application Layer Protocol - MOB-T1040" [label="uses",];"mitre-mobile-attack-malware=ANDROIDOS_ANSERVER.A - MOB-S0026" -> "mitre-mobile-attack-attack-pattern=System Information Discovery - MOB-T1029" [label="uses",];} diff --git a/static/graphs/4bf6ba32-4165-42c1-b911-9c36165891c8.png b/static/graphs/4bf6ba32-4165-42c1-b911-9c36165891c8.png new file mode 100644 index 0000000..e9869fd Binary files /dev/null and b/static/graphs/4bf6ba32-4165-42c1-b911-9c36165891c8.png differ diff --git a/static/graphs/4c057ade-6989-11e8-9efd-ab33ed427468 b/static/graphs/4c057ade-6989-11e8-9efd-ab33ed427468 new file mode 100644 index 0000000..9990283 --- /dev/null +++ b/static/graphs/4c057ade-6989-11e8-9efd-ab33ed427468 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Brambul" [label="tool\nBrambul",shape=box,style=filled,color=deepskyblue];"tool=Brambul" -> "malpedia=Brambul" [label="similar",dir="both"];} diff --git a/static/graphs/4c057ade-6989-11e8-9efd-ab33ed427468.png b/static/graphs/4c057ade-6989-11e8-9efd-ab33ed427468.png new file mode 100644 index 0000000..fbb1244 Binary files /dev/null and b/static/graphs/4c057ade-6989-11e8-9efd-ab33ed427468.png differ diff --git a/static/graphs/4c59cce8-cb48-4141-b9f1-f646edfaadb0 b/static/graphs/4c59cce8-cb48-4141-b9f1-f646edfaadb0 new file mode 100644 index 0000000..5cc48bb --- /dev/null +++ b/static/graphs/4c59cce8-cb48-4141-b9f1-f646edfaadb0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Regin - S0019" [label="mitre-enterprise-attack-malware\nRegin - S0019",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Regin - S0019" -> "tool=Regin" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Regin - S0019" -> "malpedia=Regin" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Regin - S0019" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=Regin" [label="tool\nRegin",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/4c59cce8-cb48-4141-b9f1-f646edfaadb0.png b/static/graphs/4c59cce8-cb48-4141-b9f1-f646edfaadb0.png new file mode 100644 index 0000000..4ab76ea Binary files /dev/null and b/static/graphs/4c59cce8-cb48-4141-b9f1-f646edfaadb0.png differ diff --git a/static/graphs/4ca1929c-7d64-4aab-b849-badbfc0c760d b/static/graphs/4ca1929c-7d64-4aab-b849-badbfc0c760d new file mode 100644 index 0000000..9551206 --- /dev/null +++ b/static/graphs/4ca1929c-7d64-4aab-b849-badbfc0c760d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "threat-actor=OilRig" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "threat-actor=CHRYSENE" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=Cutting Kitten" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=Cleaver" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=Clever Kitten" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=Flying Kitten" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=Charming Kitten" [label="similar",dir="both"];"threat-actor=OilRig" -> "threat-actor=Rocket Kitten" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "threat-actor=Greenbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="similar",dir="both"];"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/4ca1929c-7d64-4aab-b849-badbfc0c760d.png b/static/graphs/4ca1929c-7d64-4aab-b849-badbfc0c760d.png new file mode 100644 index 0000000..591fb2b Binary files /dev/null and b/static/graphs/4ca1929c-7d64-4aab-b849-badbfc0c760d.png differ diff --git a/static/graphs/4cfe3f22-96b8-4d3d-a6cc-85835d9471e2 b/static/graphs/4cfe3f22-96b8-4d3d-a6cc-85835d9471e2 new file mode 100644 index 0000000..6c901e9 --- /dev/null +++ b/static/graphs/4cfe3f22-96b8-4d3d-a6cc-85835d9471e2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=GratefulPOS" [label="tool\nGratefulPOS",shape=box,style=filled,color=deepskyblue];"tool=GratefulPOS" -> "banker=GratefulPOS" [label="similar",dir="both"];"banker=GratefulPOS" [label="banker\nGratefulPOS",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/4cfe3f22-96b8-4d3d-a6cc-85835d9471e2.png b/static/graphs/4cfe3f22-96b8-4d3d-a6cc-85835d9471e2.png new file mode 100644 index 0000000..528828e Binary files /dev/null and b/static/graphs/4cfe3f22-96b8-4d3d-a6cc-85835d9471e2.png differ diff --git a/static/graphs/4d37813c-b8e9-4e58-a758-03168d8aa189 b/static/graphs/4d37813c-b8e9-4e58-a758-03168d8aa189 new file mode 100644 index 0000000..37fd2bf --- /dev/null +++ b/static/graphs/4d37813c-b8e9-4e58-a758-03168d8aa189 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Pitty Panda" [label="threat-actor\nPitty Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Pitty Panda" -> "mitre-enterprise-attack-intrusion-set=PittyTiger - G0011" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=PittyTiger - G0011" [label="mitre-enterprise-attack-intrusion-set\nPittyTiger - G0011",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=PittyTiger - G0011" -> "mitre-enterprise-attack-tool=Mimikatz - S0002" [label="uses",];"mitre-enterprise-attack-tool=Mimikatz - S0002" [label="mitre-enterprise-attack-tool\nMimikatz - S0002",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Mimikatz - S0002" -> "tool=Mimikatz" [label="similar",dir="both"];"mitre-enterprise-attack-tool=Mimikatz - S0002" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];"tool=Mimikatz" [label="tool\nMimikatz",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/4d37813c-b8e9-4e58-a758-03168d8aa189.png b/static/graphs/4d37813c-b8e9-4e58-a758-03168d8aa189.png new file mode 100644 index 0000000..ad39d2d Binary files /dev/null and b/static/graphs/4d37813c-b8e9-4e58-a758-03168d8aa189.png differ diff --git a/static/graphs/4d4528ff-6260-4b5d-b2ea-6e11ca02c396 b/static/graphs/4d4528ff-6260-4b5d-b2ea-6e11ca02c396 new file mode 100644 index 0000000..5e61c03 --- /dev/null +++ b/static/graphs/4d4528ff-6260-4b5d-b2ea-6e11ca02c396 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Jolob" [label="tool\nJolob",shape=box,style=filled,color=deepskyblue];"tool=Jolob" -> "malpedia=Jolob" [label="similar",dir="both"];} diff --git a/static/graphs/4d4528ff-6260-4b5d-b2ea-6e11ca02c396.png b/static/graphs/4d4528ff-6260-4b5d-b2ea-6e11ca02c396.png new file mode 100644 index 0000000..e5ba5e3 Binary files /dev/null and b/static/graphs/4d4528ff-6260-4b5d-b2ea-6e11ca02c396.png differ diff --git a/static/graphs/4e104fef-8a2c-4679-b497-6e86d7d47db0 b/static/graphs/4e104fef-8a2c-4679-b497-6e86d7d47db0 new file mode 100644 index 0000000..029141e --- /dev/null +++ b/static/graphs/4e104fef-8a2c-4679-b497-6e86d7d47db0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="similar",dir="both"];"rat=PoisonIvy" -> "tool=Poison Ivy" [label="similar",dir="both"];"rat=PoisonIvy" -> "tool=poisonivy" [label="similar",dir="both"];"rat=PoisonIvy" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];} diff --git a/static/graphs/4e104fef-8a2c-4679-b497-6e86d7d47db0.png b/static/graphs/4e104fef-8a2c-4679-b497-6e86d7d47db0.png new file mode 100644 index 0000000..77f77f4 Binary files /dev/null and b/static/graphs/4e104fef-8a2c-4679-b497-6e86d7d47db0.png differ diff --git a/static/graphs/4e2f0af2-6d2d-4a49-adc9-fae3745fcb72 b/static/graphs/4e2f0af2-6d2d-4a49-adc9-fae3745fcb72 new file mode 100644 index 0000000..de4f5d5 --- /dev/null +++ b/static/graphs/4e2f0af2-6d2d-4a49-adc9-fae3745fcb72 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Mughthesec" [label="tool\nMughthesec",shape=box,style=filled,color=deepskyblue];"tool=Mughthesec" -> "malpedia=Mughthesec" [label="similar",dir="both"];} diff --git a/static/graphs/4e2f0af2-6d2d-4a49-adc9-fae3745fcb72.png b/static/graphs/4e2f0af2-6d2d-4a49-adc9-fae3745fcb72.png new file mode 100644 index 0000000..92c2864 Binary files /dev/null and b/static/graphs/4e2f0af2-6d2d-4a49-adc9-fae3745fcb72.png differ diff --git a/static/graphs/4e6b9625-bbda-4d96-a652-b3bb45453f26 b/static/graphs/4e6b9625-bbda-4d96-a652-b3bb45453f26 new file mode 100644 index 0000000..d6ebb43 --- /dev/null +++ b/static/graphs/4e6b9625-bbda-4d96-a652-b3bb45453f26 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=RemoteCMD - S0166" [label="mitre-enterprise-attack-malware\nRemoteCMD - S0166",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RemoteCMD - S0166" -> "mitre-enterprise-attack-attack-pattern=Remote Services - T1021" [label="uses",];} diff --git a/static/graphs/4e6b9625-bbda-4d96-a652-b3bb45453f26.png b/static/graphs/4e6b9625-bbda-4d96-a652-b3bb45453f26.png new file mode 100644 index 0000000..758ab72 Binary files /dev/null and b/static/graphs/4e6b9625-bbda-4d96-a652-b3bb45453f26.png differ diff --git a/static/graphs/4ed03b03-a34f-4583-9db1-6c58a4bd952b b/static/graphs/4ed03b03-a34f-4583-9db1-6c58a4bd952b new file mode 100644 index 0000000..ed496d8 --- /dev/null +++ b/static/graphs/4ed03b03-a34f-4583-9db1-6c58a4bd952b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=BankBot" [label="android\nBankBot",shape=box,style=filled,color=deepskyblue];"android=BankBot" -> "malpedia=Anubis (Android)" [label="similar",dir="both"];} diff --git a/static/graphs/4ed03b03-a34f-4583-9db1-6c58a4bd952b.png b/static/graphs/4ed03b03-a34f-4583-9db1-6c58a4bd952b.png new file mode 100644 index 0000000..352ac3c Binary files /dev/null and b/static/graphs/4ed03b03-a34f-4583-9db1-6c58a4bd952b.png differ diff --git a/static/graphs/4f170666-7edb-4489-85c2-9affa28a72e0 b/static/graphs/4f170666-7edb-4489-85c2-9affa28a72e0 new file mode 100644 index 0000000..f1d1251 --- /dev/null +++ b/static/graphs/4f170666-7edb-4489-85c2-9affa28a72e0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=.bash_profile and .bashrc Mitigation - T1156" [label="mitre-enterprise-attack-course-of-action\n.bash_profile and .bashrc Mitigation - T1156",shape=ellipse];"mitre-enterprise-attack-course-of-action=.bash_profile and .bashrc Mitigation - T1156" -> "mitre-enterprise-attack-attack-pattern=.bash_profile and .bashrc - T1156" [label="mitigates",];} diff --git a/static/graphs/4f170666-7edb-4489-85c2-9affa28a72e0.png b/static/graphs/4f170666-7edb-4489-85c2-9affa28a72e0.png new file mode 100644 index 0000000..edd7f46 Binary files /dev/null and b/static/graphs/4f170666-7edb-4489-85c2-9affa28a72e0.png differ diff --git a/static/graphs/4f3e494e-0e37-4894-94b2-741a8100f07a b/static/graphs/4f3e494e-0e37-4894-94b2-741a8100f07a new file mode 100644 index 0000000..e371727 --- /dev/null +++ b/static/graphs/4f3e494e-0e37-4894-94b2-741a8100f07a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Cryakl" [label="ransomware\nCryakl",shape=box,style=filled,color=deepskyblue];"ransomware=Cryakl" -> "ransomware=Offline ransomware" [label="similar",dir="both"];"ransomware=Cryakl" -> "malpedia=Cryakl" [label="similar",dir="both"];"ransomware=Offline ransomware" [label="ransomware\nOffline ransomware",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/4f3e494e-0e37-4894-94b2-741a8100f07a.png b/static/graphs/4f3e494e-0e37-4894-94b2-741a8100f07a.png new file mode 100644 index 0000000..4400ed7 Binary files /dev/null and b/static/graphs/4f3e494e-0e37-4894-94b2-741a8100f07a.png differ diff --git a/static/graphs/4f45dfeb-fe51-4df0-8db3-edf7dd0513fe b/static/graphs/4f45dfeb-fe51-4df0-8db3-edf7dd0513fe new file mode 100644 index 0000000..f0bb821 --- /dev/null +++ b/static/graphs/4f45dfeb-fe51-4df0-8db3-edf7dd0513fe @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Fgdump - S0120" [label="mitre-enterprise-attack-tool\nFgdump - S0120",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Fgdump - S0120" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];} diff --git a/static/graphs/4f45dfeb-fe51-4df0-8db3-edf7dd0513fe.png b/static/graphs/4f45dfeb-fe51-4df0-8db3-edf7dd0513fe.png new file mode 100644 index 0000000..4097faa Binary files /dev/null and b/static/graphs/4f45dfeb-fe51-4df0-8db3-edf7dd0513fe.png differ diff --git a/static/graphs/4f69ec6d-cb6b-42af-b8e2-920a2aa4be10 b/static/graphs/4f69ec6d-cb6b-42af-b8e2-920a2aa4be10 new file mode 100644 index 0000000..d7cf3af --- /dev/null +++ b/static/graphs/4f69ec6d-cb6b-42af-b8e2-920a2aa4be10 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=APT33" [label="threat-actor\nAPT33",shape=octagon,style=filled,color=indianred1];"threat-actor=APT33" -> "mitre-enterprise-attack-intrusion-set=APT33 - G0064" [label="similar",dir="both"];"threat-actor=APT33" -> "threat-actor=MAGNALLIUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT33 - G0064" [label="mitre-enterprise-attack-intrusion-set\nAPT33 - G0064",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT33 - G0064" -> "mitre-enterprise-attack-attack-pattern=Spearphishing Link - T1192" [label="uses",];"threat-actor=MAGNALLIUM" [label="threat-actor\nMAGNALLIUM",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/4f69ec6d-cb6b-42af-b8e2-920a2aa4be10.png b/static/graphs/4f69ec6d-cb6b-42af-b8e2-920a2aa4be10.png new file mode 100644 index 0000000..ec3af44 Binary files /dev/null and b/static/graphs/4f69ec6d-cb6b-42af-b8e2-920a2aa4be10.png differ diff --git a/static/graphs/4f6aa78c-c3d4-4883-9840-96ca2f5d6d47 b/static/graphs/4f6aa78c-c3d4-4883-9840-96ca2f5d6d47 new file mode 100644 index 0000000..85940fd --- /dev/null +++ b/static/graphs/4f6aa78c-c3d4-4883-9840-96ca2f5d6d47 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=TEXTMATE - S0146" [label="mitre-enterprise-attack-malware\nTEXTMATE - S0146",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TEXTMATE - S0146" -> "rat=DNSMessenger" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TEXTMATE - S0146" -> "mitre-enterprise-attack-malware=POWERSOURCE - S0145" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TEXTMATE - S0146" -> "malpedia=DNSMessenger" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TEXTMATE - S0146" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"mitre-enterprise-attack-malware=POWERSOURCE - S0145" [label="mitre-enterprise-attack-malware\nPOWERSOURCE - S0145",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=POWERSOURCE - S0145" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"rat=DNSMessenger" [label="rat\nDNSMessenger",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/4f6aa78c-c3d4-4883-9840-96ca2f5d6d47.png b/static/graphs/4f6aa78c-c3d4-4883-9840-96ca2f5d6d47.png new file mode 100644 index 0000000..abf6b12 Binary files /dev/null and b/static/graphs/4f6aa78c-c3d4-4883-9840-96ca2f5d6d47.png differ diff --git a/static/graphs/4fa49fc0-9162-4bdb-a37e-7aa3dcb6d38b b/static/graphs/4fa49fc0-9162-4bdb-a37e-7aa3dcb6d38b new file mode 100644 index 0000000..a93e68c --- /dev/null +++ b/static/graphs/4fa49fc0-9162-4bdb-a37e-7aa3dcb6d38b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=xCmd - S0123" [label="mitre-enterprise-attack-tool\nxCmd - S0123",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=xCmd - S0123" -> "mitre-enterprise-attack-attack-pattern=Service Execution - T1035" [label="uses",];} diff --git a/static/graphs/4fa49fc0-9162-4bdb-a37e-7aa3dcb6d38b.png b/static/graphs/4fa49fc0-9162-4bdb-a37e-7aa3dcb6d38b.png new file mode 100644 index 0000000..200e24b Binary files /dev/null and b/static/graphs/4fa49fc0-9162-4bdb-a37e-7aa3dcb6d38b.png differ diff --git a/static/graphs/4fe80228-1142-4e70-9df8-c8f1f3356cfb b/static/graphs/4fe80228-1142-4e70-9df8-c8f1f3356cfb new file mode 100644 index 0000000..04950b8 --- /dev/null +++ b/static/graphs/4fe80228-1142-4e70-9df8-c8f1f3356cfb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=WellMess" [label="tool\nWellMess",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/4fe80228-1142-4e70-9df8-c8f1f3356cfb.png b/static/graphs/4fe80228-1142-4e70-9df8-c8f1f3356cfb.png new file mode 100644 index 0000000..d51f0ad Binary files /dev/null and b/static/graphs/4fe80228-1142-4e70-9df8-c8f1f3356cfb.png differ diff --git a/static/graphs/503c9910-902f-4bae-8c33-ea29db8bdd7f b/static/graphs/503c9910-902f-4bae-8c33-ea29db8bdd7f new file mode 100644 index 0000000..a9393c2 --- /dev/null +++ b/static/graphs/503c9910-902f-4bae-8c33-ea29db8bdd7f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Shark" [label="ransomware\nShark",shape=box,style=filled,color=deepskyblue];"ransomware=Shark" -> "rat=SharK" [label="similar",dir="both"];"rat=SharK" [label="rat\nSharK",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/503c9910-902f-4bae-8c33-ea29db8bdd7f.png b/static/graphs/503c9910-902f-4bae-8c33-ea29db8bdd7f.png new file mode 100644 index 0000000..2be0c78 Binary files /dev/null and b/static/graphs/503c9910-902f-4bae-8c33-ea29db8bdd7f.png differ diff --git a/static/graphs/507fe748-5e4a-4b45-9e9f-8b1115f4e878 b/static/graphs/507fe748-5e4a-4b45-9e9f-8b1115f4e878 new file mode 100644 index 0000000..aad016f --- /dev/null +++ b/static/graphs/507fe748-5e4a-4b45-9e9f-8b1115f4e878 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=DualToy - MOB-S0031" [label="mitre-mobile-attack-malware\nDualToy - MOB-S0031",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=DualToy - MOB-S0031" -> "malpedia=DualToy (Android)" [label="similar",dir="both"];"mitre-mobile-attack-malware=DualToy - MOB-S0031" -> "mitre-mobile-attack-attack-pattern=Exploit via Charging Station or PC - MOB-T1061" [label="uses",];} diff --git a/static/graphs/507fe748-5e4a-4b45-9e9f-8b1115f4e878.png b/static/graphs/507fe748-5e4a-4b45-9e9f-8b1115f4e878.png new file mode 100644 index 0000000..3eb3e62 Binary files /dev/null and b/static/graphs/507fe748-5e4a-4b45-9e9f-8b1115f4e878.png differ diff --git a/static/graphs/50cd027f-df14-40b2-aa22-bf5de5061163 b/static/graphs/50cd027f-df14-40b2-aa22-bf5de5061163 new file mode 100644 index 0000000..51785f3 --- /dev/null +++ b/static/graphs/50cd027f-df14-40b2-aa22-bf5de5061163 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=APT37" [label="threat-actor\nAPT37",shape=octagon,style=filled,color=indianred1];"threat-actor=APT37" -> "mitre-enterprise-attack-intrusion-set=APT37 - G0067" [label="similar",dir="both"];"threat-actor=APT37" -> "threat-actor=Lazarus Group" [label="linked-to",];"mitre-enterprise-attack-intrusion-set=APT37 - G0067" [label="mitre-enterprise-attack-intrusion-set\nAPT37 - G0067",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT37 - G0067" -> "mitre-enterprise-attack-attack-pattern=Custom Command and Control Protocol - T1094" [label="uses",];"threat-actor=Lazarus Group" [label="threat-actor\nLazarus Group",shape=octagon,style=filled,color=indianred1];"threat-actor=Lazarus Group" -> "mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" [label="similar",dir="both"];"threat-actor=Lazarus Group" -> "threat-actor=Operation Sharpshooter" [label="similar",dir="both"];"threat-actor=Lazarus Group" -> "threat-actor=APT37" [label="linked-to",];"mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" [label="mitre-enterprise-attack-intrusion-set\nLazarus Group - G0032",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" -> "mitre-enterprise-attack-attack-pattern=Windows Admin Shares - T1077" [label="uses",];"threat-actor=Operation Sharpshooter" [label="threat-actor\nOperation Sharpshooter",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/50cd027f-df14-40b2-aa22-bf5de5061163.png b/static/graphs/50cd027f-df14-40b2-aa22-bf5de5061163.png new file mode 100644 index 0000000..256ddfb Binary files /dev/null and b/static/graphs/50cd027f-df14-40b2-aa22-bf5de5061163.png differ diff --git a/static/graphs/51048ba0-a5aa-41e7-bf5d-993cd217dfb2 b/static/graphs/51048ba0-a5aa-41e7-bf5d-993cd217dfb2 new file mode 100644 index 0000000..622c486 --- /dev/null +++ b/static/graphs/51048ba0-a5aa-41e7-bf5d-993cd217dfb2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Signed Script Proxy Execution Mitigation - T1216" [label="mitre-enterprise-attack-course-of-action\nSigned Script Proxy Execution Mitigation - T1216",shape=ellipse];"mitre-enterprise-attack-course-of-action=Signed Script Proxy Execution Mitigation - T1216" -> "mitre-enterprise-attack-attack-pattern=Signed Script Proxy Execution - T1216" [label="mitigates",];} diff --git a/static/graphs/51048ba0-a5aa-41e7-bf5d-993cd217dfb2.png b/static/graphs/51048ba0-a5aa-41e7-bf5d-993cd217dfb2.png new file mode 100644 index 0000000..70a8065 Binary files /dev/null and b/static/graphs/51048ba0-a5aa-41e7-bf5d-993cd217dfb2.png differ diff --git a/static/graphs/514e7371-a344-4de7-8ec3-3aa42b801d52 b/static/graphs/514e7371-a344-4de7-8ec3-3aa42b801d52 new file mode 100644 index 0000000..f24c0bb --- /dev/null +++ b/static/graphs/514e7371-a344-4de7-8ec3-3aa42b801d52 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Multi-Stage Channels Mitigation - T1104" [label="mitre-enterprise-attack-course-of-action\nMulti-Stage Channels Mitigation - T1104",shape=ellipse];"mitre-enterprise-attack-course-of-action=Multi-Stage Channels Mitigation - T1104" -> "mitre-enterprise-attack-attack-pattern=Multi-Stage Channels - T1104" [label="mitigates",];} diff --git a/static/graphs/514e7371-a344-4de7-8ec3-3aa42b801d52.png b/static/graphs/514e7371-a344-4de7-8ec3-3aa42b801d52.png new file mode 100644 index 0000000..f00746c Binary files /dev/null and b/static/graphs/514e7371-a344-4de7-8ec3-3aa42b801d52.png differ diff --git a/static/graphs/515f6584-fa98-44fe-a4e8-e428c7188514 b/static/graphs/515f6584-fa98-44fe-a4e8-e428c7188514 new file mode 100644 index 0000000..15bfdd0 --- /dev/null +++ b/static/graphs/515f6584-fa98-44fe-a4e8-e428c7188514 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Fallback Channels Mitigation - T1008" [label="mitre-enterprise-attack-course-of-action\nFallback Channels Mitigation - T1008",shape=ellipse];"mitre-enterprise-attack-course-of-action=Fallback Channels Mitigation - T1008" -> "mitre-enterprise-attack-attack-pattern=Fallback Channels - T1008" [label="mitigates",];} diff --git a/static/graphs/515f6584-fa98-44fe-a4e8-e428c7188514.png b/static/graphs/515f6584-fa98-44fe-a4e8-e428c7188514.png new file mode 100644 index 0000000..2b10836 Binary files /dev/null and b/static/graphs/515f6584-fa98-44fe-a4e8-e428c7188514.png differ diff --git a/static/graphs/51aedbd6-2837-4d15-aeb0-cb09f2bf22ac b/static/graphs/51aedbd6-2837-4d15-aeb0-cb09f2bf22ac new file mode 100644 index 0000000..771e48c --- /dev/null +++ b/static/graphs/51aedbd6-2837-4d15-aeb0-cb09f2bf22ac @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Abuse of iOS Enterprise App Signing Key - MOB-T1048" [label="mitre-mobile-attack-attack-pattern\nAbuse of iOS Enterprise App Signing Key - MOB-T1048",shape=ellipse];} diff --git a/static/graphs/51aedbd6-2837-4d15-aeb0-cb09f2bf22ac.png b/static/graphs/51aedbd6-2837-4d15-aeb0-cb09f2bf22ac.png new file mode 100644 index 0000000..cad96b7 Binary files /dev/null and b/static/graphs/51aedbd6-2837-4d15-aeb0-cb09f2bf22ac.png differ diff --git a/static/graphs/51b0559d-547f-40c0-850a-df9f67c08baf b/static/graphs/51b0559d-547f-40c0-850a-df9f67c08baf new file mode 100644 index 0000000..27ddfa9 --- /dev/null +++ b/static/graphs/51b0559d-547f-40c0-850a-df9f67c08baf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Wallet" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];} diff --git a/static/graphs/51b0559d-547f-40c0-850a-df9f67c08baf.png b/static/graphs/51b0559d-547f-40c0-850a-df9f67c08baf.png new file mode 100644 index 0000000..08f1787 Binary files /dev/null and b/static/graphs/51b0559d-547f-40c0-850a-df9f67c08baf.png differ diff --git a/static/graphs/51b37302-b844-4c08-ac98-ae6955ed1f55 b/static/graphs/51b37302-b844-4c08-ac98-ae6955ed1f55 new file mode 100644 index 0000000..b0126de --- /dev/null +++ b/static/graphs/51b37302-b844-4c08-ac98-ae6955ed1f55 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Screen Capture Mitigation - T1113" [label="mitre-enterprise-attack-course-of-action\nScreen Capture Mitigation - T1113",shape=ellipse];"mitre-enterprise-attack-course-of-action=Screen Capture Mitigation - T1113" -> "mitre-enterprise-attack-attack-pattern=Screen Capture - T1113" [label="mitigates",];} diff --git a/static/graphs/51b37302-b844-4c08-ac98-ae6955ed1f55.png b/static/graphs/51b37302-b844-4c08-ac98-ae6955ed1f55.png new file mode 100644 index 0000000..37e97d0 Binary files /dev/null and b/static/graphs/51b37302-b844-4c08-ac98-ae6955ed1f55.png differ diff --git a/static/graphs/525ce93a-76a1-441a-9c45-0eac64d0ed12 b/static/graphs/525ce93a-76a1-441a-9c45-0eac64d0ed12 new file mode 100644 index 0000000..a92ab37 --- /dev/null +++ b/static/graphs/525ce93a-76a1-441a-9c45-0eac64d0ed12 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Empire" [label="tool\nEmpire",shape=box,style=filled,color=deepskyblue];"tool=Empire" -> "exploit-kit=Empire" [label="similar",dir="both"];"exploit-kit=Empire" [label="exploit-kit\nEmpire",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/525ce93a-76a1-441a-9c45-0eac64d0ed12.png b/static/graphs/525ce93a-76a1-441a-9c45-0eac64d0ed12.png new file mode 100644 index 0000000..f917019 Binary files /dev/null and b/static/graphs/525ce93a-76a1-441a-9c45-0eac64d0ed12.png differ diff --git a/static/graphs/52c5f9b3-e9ed-4c86-b4a8-d4ebc68a4d7b b/static/graphs/52c5f9b3-e9ed-4c86-b4a8-d4ebc68a4d7b new file mode 100644 index 0000000..c99240f --- /dev/null +++ b/static/graphs/52c5f9b3-e9ed-4c86-b4a8-d4ebc68a4d7b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=Igexin" [label="android\nIgexin",shape=box,style=filled,color=deepskyblue];"android=Igexin" -> "android=IcicleGum" [label="similar",dir="both"];"android=IcicleGum" [label="android\nIcicleGum",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/52c5f9b3-e9ed-4c86-b4a8-d4ebc68a4d7b.png b/static/graphs/52c5f9b3-e9ed-4c86-b4a8-d4ebc68a4d7b.png new file mode 100644 index 0000000..d9f00c9 Binary files /dev/null and b/static/graphs/52c5f9b3-e9ed-4c86-b4a8-d4ebc68a4d7b.png differ diff --git a/static/graphs/52caade6-ba7b-474e-b173-63f4332aa808 b/static/graphs/52caade6-ba7b-474e-b173-63f4332aa808 new file mode 100644 index 0000000..a0265df --- /dev/null +++ b/static/graphs/52caade6-ba7b-474e-b173-63f4332aa808 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=EnkripsiPC Ransomware" [label="ransomware\nEnkripsiPC Ransomware",shape=box,style=filled,color=deepskyblue];"ransomware=EnkripsiPC Ransomware" -> "malpedia=Manifestus" [label="similar",dir="both"];} diff --git a/static/graphs/52caade6-ba7b-474e-b173-63f4332aa808.png b/static/graphs/52caade6-ba7b-474e-b173-63f4332aa808.png new file mode 100644 index 0000000..06f5d6b Binary files /dev/null and b/static/graphs/52caade6-ba7b-474e-b173-63f4332aa808.png differ diff --git a/static/graphs/5391ece4-8866-415d-9b5e-8dc5944f612a b/static/graphs/5391ece4-8866-415d-9b5e-8dc5944f612a new file mode 100644 index 0000000..166bb03 --- /dev/null +++ b/static/graphs/5391ece4-8866-415d-9b5e-8dc5944f612a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Source Mitigation - T1153" [label="mitre-enterprise-attack-course-of-action\nSource Mitigation - T1153",shape=ellipse];"mitre-enterprise-attack-course-of-action=Source Mitigation - T1153" -> "mitre-enterprise-attack-attack-pattern=Source - T1153" [label="mitigates",];} diff --git a/static/graphs/5391ece4-8866-415d-9b5e-8dc5944f612a.png b/static/graphs/5391ece4-8866-415d-9b5e-8dc5944f612a.png new file mode 100644 index 0000000..4de33dc Binary files /dev/null and b/static/graphs/5391ece4-8866-415d-9b5e-8dc5944f612a.png differ diff --git a/static/graphs/53b3b027-bed3-480c-9101-1247047d0fe6 b/static/graphs/53b3b027-bed3-480c-9101-1247047d0fe6 new file mode 100644 index 0000000..f5d27d0 --- /dev/null +++ b/static/graphs/53b3b027-bed3-480c-9101-1247047d0fe6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Remote Desktop Protocol Mitigation - T1076" [label="mitre-enterprise-attack-course-of-action\nRemote Desktop Protocol Mitigation - T1076",shape=ellipse];"mitre-enterprise-attack-course-of-action=Remote Desktop Protocol Mitigation - T1076" -> "mitre-enterprise-attack-attack-pattern=Remote Desktop Protocol - T1076" [label="mitigates",];} diff --git a/static/graphs/53b3b027-bed3-480c-9101-1247047d0fe6.png b/static/graphs/53b3b027-bed3-480c-9101-1247047d0fe6.png new file mode 100644 index 0000000..4caf00c Binary files /dev/null and b/static/graphs/53b3b027-bed3-480c-9101-1247047d0fe6.png differ diff --git a/static/graphs/53cf6cc4-65aa-445a-bcf8-c3d296f8a7a2 b/static/graphs/53cf6cc4-65aa-445a-bcf8-c3d296f8a7a2 new file mode 100644 index 0000000..20361b1 --- /dev/null +++ b/static/graphs/53cf6cc4-65aa-445a-bcf8-c3d296f8a7a2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=NETEAGLE - S0034" [label="mitre-enterprise-attack-malware\nNETEAGLE - S0034",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=NETEAGLE - S0034" -> "malpedia=NETEAGLE" [label="similar",dir="both"];"mitre-enterprise-attack-malware=NETEAGLE - S0034" -> "mitre-enterprise-attack-attack-pattern=Fallback Channels - T1008" [label="uses",];} diff --git a/static/graphs/53cf6cc4-65aa-445a-bcf8-c3d296f8a7a2.png b/static/graphs/53cf6cc4-65aa-445a-bcf8-c3d296f8a7a2.png new file mode 100644 index 0000000..9702ddb Binary files /dev/null and b/static/graphs/53cf6cc4-65aa-445a-bcf8-c3d296f8a7a2.png differ diff --git a/static/graphs/53d47b09-09c2-4015-8d37-6633ecd53f79 b/static/graphs/53d47b09-09c2-4015-8d37-6633ecd53f79 new file mode 100644 index 0000000..8e18a41 --- /dev/null +++ b/static/graphs/53d47b09-09c2-4015-8d37-6633ecd53f79 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=POORAIM - S0216" [label="mitre-enterprise-attack-malware\nPOORAIM - S0216",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=POORAIM - S0216" -> "tool=POORAIM" [label="similar",dir="both"];"mitre-enterprise-attack-malware=POORAIM - S0216" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];"tool=POORAIM" [label="tool\nPOORAIM",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/53d47b09-09c2-4015-8d37-6633ecd53f79.png b/static/graphs/53d47b09-09c2-4015-8d37-6633ecd53f79.png new file mode 100644 index 0000000..8a0111c Binary files /dev/null and b/static/graphs/53d47b09-09c2-4015-8d37-6633ecd53f79.png differ diff --git a/static/graphs/53e2e7e8-70a8-11e8-b0f8-33fcf651adaf b/static/graphs/53e2e7e8-70a8-11e8-b0f8-33fcf651adaf new file mode 100644 index 0000000..5566e7d --- /dev/null +++ b/static/graphs/53e2e7e8-70a8-11e8-b0f8-33fcf651adaf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=MysteryBot" [label="android\nMysteryBot",shape=box,style=filled,color=deepskyblue];"android=MysteryBot" -> "malpedia=MysteryBot" [label="similar",dir="both"];} diff --git a/static/graphs/53e2e7e8-70a8-11e8-b0f8-33fcf651adaf.png b/static/graphs/53e2e7e8-70a8-11e8-b0f8-33fcf651adaf.png new file mode 100644 index 0000000..92bfaa7 Binary files /dev/null and b/static/graphs/53e2e7e8-70a8-11e8-b0f8-33fcf651adaf.png differ diff --git a/static/graphs/54246e2e-683f-4bf2-be4c-d7d5a60e7d22 b/static/graphs/54246e2e-683f-4bf2-be4c-d7d5a60e7d22 new file mode 100644 index 0000000..a2c54fa --- /dev/null +++ b/static/graphs/54246e2e-683f-4bf2-be4c-d7d5a60e7d22 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=LLMNR/NBT-NS Poisoning Mitigation - T1171" [label="mitre-enterprise-attack-course-of-action\nLLMNR/NBT-NS Poisoning Mitigation - T1171",shape=ellipse];"mitre-enterprise-attack-course-of-action=LLMNR/NBT-NS Poisoning Mitigation - T1171" -> "mitre-enterprise-attack-attack-pattern=LLMNR/NBT-NS Poisoning - T1171" [label="mitigates",];} diff --git a/static/graphs/54246e2e-683f-4bf2-be4c-d7d5a60e7d22.png b/static/graphs/54246e2e-683f-4bf2-be4c-d7d5a60e7d22.png new file mode 100644 index 0000000..d421c46 Binary files /dev/null and b/static/graphs/54246e2e-683f-4bf2-be4c-d7d5a60e7d22.png differ diff --git a/static/graphs/548bf7ad-e19c-4d74-84bf-84ac4e57f505 b/static/graphs/548bf7ad-e19c-4d74-84bf-84ac4e57f505 new file mode 100644 index 0000000..b19e0c2 --- /dev/null +++ b/static/graphs/548bf7ad-e19c-4d74-84bf-84ac4e57f505 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=User Execution Mitigation - T1204" [label="mitre-enterprise-attack-course-of-action\nUser Execution Mitigation - T1204",shape=ellipse];"mitre-enterprise-attack-course-of-action=User Execution Mitigation - T1204" -> "mitre-enterprise-attack-attack-pattern=User Execution - T1204" [label="mitigates",];} diff --git a/static/graphs/548bf7ad-e19c-4d74-84bf-84ac4e57f505.png b/static/graphs/548bf7ad-e19c-4d74-84bf-84ac4e57f505.png new file mode 100644 index 0000000..e600231 Binary files /dev/null and b/static/graphs/548bf7ad-e19c-4d74-84bf-84ac4e57f505.png differ diff --git a/static/graphs/548e3dcd-8448-4318-830a-b8fa46f34fd3 b/static/graphs/548e3dcd-8448-4318-830a-b8fa46f34fd3 new file mode 100644 index 0000000..8e041cc --- /dev/null +++ b/static/graphs/548e3dcd-8448-4318-830a-b8fa46f34fd3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Zayka" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];} diff --git a/static/graphs/548e3dcd-8448-4318-830a-b8fa46f34fd3.png b/static/graphs/548e3dcd-8448-4318-830a-b8fa46f34fd3.png new file mode 100644 index 0000000..19780c0 Binary files /dev/null and b/static/graphs/548e3dcd-8448-4318-830a-b8fa46f34fd3.png differ diff --git a/static/graphs/54cc1d4f-5c53-4f0e-9ef5-11b4998e82e4 b/static/graphs/54cc1d4f-5c53-4f0e-9ef5-11b4998e82e4 new file mode 100644 index 0000000..9943640 --- /dev/null +++ b/static/graphs/54cc1d4f-5c53-4f0e-9ef5-11b4998e82e4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="mitre-enterprise-attack-malware\nBlackEnergy - S0089",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "tool=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "malpedia=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];"tool=BlackEnergy" [label="tool\nBlackEnergy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/54cc1d4f-5c53-4f0e-9ef5-11b4998e82e4.png b/static/graphs/54cc1d4f-5c53-4f0e-9ef5-11b4998e82e4.png new file mode 100644 index 0000000..d52742b Binary files /dev/null and b/static/graphs/54cc1d4f-5c53-4f0e-9ef5-11b4998e82e4.png differ diff --git a/static/graphs/54e8722d-2faf-4b1b-93b6-6cbf9551669f b/static/graphs/54e8722d-2faf-4b1b-93b6-6cbf9551669f new file mode 100644 index 0000000..059705d --- /dev/null +++ b/static/graphs/54e8722d-2faf-4b1b-93b6-6cbf9551669f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Hardware Additions Mitigation - T1200" [label="mitre-enterprise-attack-course-of-action\nHardware Additions Mitigation - T1200",shape=ellipse];"mitre-enterprise-attack-course-of-action=Hardware Additions Mitigation - T1200" -> "mitre-enterprise-attack-attack-pattern=Hardware Additions - T1200" [label="mitigates",];} diff --git a/static/graphs/54e8722d-2faf-4b1b-93b6-6cbf9551669f.png b/static/graphs/54e8722d-2faf-4b1b-93b6-6cbf9551669f.png new file mode 100644 index 0000000..59a06bd Binary files /dev/null and b/static/graphs/54e8722d-2faf-4b1b-93b6-6cbf9551669f.png differ diff --git a/static/graphs/54eb2bab-125f-4d1c-b999-0c692860bafe b/static/graphs/54eb2bab-125f-4d1c-b999-0c692860bafe new file mode 100644 index 0000000..4cfc592 --- /dev/null +++ b/static/graphs/54eb2bab-125f-4d1c-b999-0c692860bafe @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Dynamic DNS - PRE-T1110" [label="mitre-pre-attack-attack-pattern\nDynamic DNS - PRE-T1110",shape=ellipse];"mitre-pre-attack-attack-pattern=Dynamic DNS - PRE-T1110" -> "mitre-pre-attack-attack-pattern=Dynamic DNS - PRE-T1088" [label="related-to",];"mitre-pre-attack-attack-pattern=Dynamic DNS - PRE-T1088" [label="mitre-pre-attack-attack-pattern\nDynamic DNS - PRE-T1088",shape=ellipse];"mitre-pre-attack-attack-pattern=Dynamic DNS - PRE-T1088" -> "mitre-pre-attack-attack-pattern=Dynamic DNS - PRE-T1110" [label="related-to",];} diff --git a/static/graphs/54eb2bab-125f-4d1c-b999-0c692860bafe.png b/static/graphs/54eb2bab-125f-4d1c-b999-0c692860bafe.png new file mode 100644 index 0000000..b74da10 Binary files /dev/null and b/static/graphs/54eb2bab-125f-4d1c-b999-0c692860bafe.png differ diff --git a/static/graphs/55033a4d-3ffe-46b2-99b4-2c1541e9ce1c b/static/graphs/55033a4d-3ffe-46b2-99b4-2c1541e9ce1c new file mode 100644 index 0000000..81ba58e --- /dev/null +++ b/static/graphs/55033a4d-3ffe-46b2-99b4-2c1541e9ce1c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Carbanak - G0008" [label="mitre-enterprise-attack-intrusion-set\nCarbanak - G0008",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Carbanak - G0008" -> "mitre-enterprise-attack-intrusion-set=FIN7 - G0046" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Carbanak - G0008" -> "threat-actor=FIN7" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Carbanak - G0008" -> "mitre-enterprise-attack-attack-pattern=Remote Access Tools - T1219" [label="uses",];"mitre-enterprise-attack-intrusion-set=FIN7 - G0046" [label="mitre-enterprise-attack-intrusion-set\nFIN7 - G0046",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=FIN7 - G0046" -> "mitre-enterprise-attack-attack-pattern=Scheduled Task - T1053" [label="uses",];"threat-actor=FIN7" [label="threat-actor\nFIN7",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/55033a4d-3ffe-46b2-99b4-2c1541e9ce1c.png b/static/graphs/55033a4d-3ffe-46b2-99b4-2c1541e9ce1c.png new file mode 100644 index 0000000..3f788b3 Binary files /dev/null and b/static/graphs/55033a4d-3ffe-46b2-99b4-2c1541e9ce1c.png differ diff --git a/static/graphs/552462b9-ae79-49dd-855c-5973014e157f b/static/graphs/552462b9-ae79-49dd-855c-5973014e157f new file mode 100644 index 0000000..ff00b7a --- /dev/null +++ b/static/graphs/552462b9-ae79-49dd-855c-5973014e157f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Zeroaccess - S0027" [label="mitre-enterprise-attack-malware\nZeroaccess - S0027",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Zeroaccess - S0027" -> "mitre-enterprise-attack-attack-pattern=Rootkit - T1014" [label="uses",];} diff --git a/static/graphs/552462b9-ae79-49dd-855c-5973014e157f.png b/static/graphs/552462b9-ae79-49dd-855c-5973014e157f.png new file mode 100644 index 0000000..4feca0b Binary files /dev/null and b/static/graphs/552462b9-ae79-49dd-855c-5973014e157f.png differ diff --git a/static/graphs/5541471c-8d15-4aec-9996-e24b59c3e3d6 b/static/graphs/5541471c-8d15-4aec-9996-e24b59c3e3d6 new file mode 100644 index 0000000..bf0fffa --- /dev/null +++ b/static/graphs/5541471c-8d15-4aec-9996-e24b59c3e3d6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Globe2 Ransomware" [label="ransomware\nGlobe2 Ransomware",shape=box,style=filled,color=deepskyblue];"ransomware=Globe2 Ransomware" -> "ransomware=Globe3 Ransomware" [label="similar",dir="both"];"ransomware=Globe3 Ransomware" [label="ransomware\nGlobe3 Ransomware",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/5541471c-8d15-4aec-9996-e24b59c3e3d6.png b/static/graphs/5541471c-8d15-4aec-9996-e24b59c3e3d6.png new file mode 100644 index 0000000..108cba1 Binary files /dev/null and b/static/graphs/5541471c-8d15-4aec-9996-e24b59c3e3d6.png differ diff --git a/static/graphs/5594b171-32ec-4145-b712-e7701effffdd b/static/graphs/5594b171-32ec-4145-b712-e7701effffdd new file mode 100644 index 0000000..9393a51 --- /dev/null +++ b/static/graphs/5594b171-32ec-4145-b712-e7701effffdd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Tinba" [label="banker\nTinba",shape=box,style=filled,color=deepskyblue];"banker=Tinba" -> "tool=Tinba" [label="similar",dir="both"];"banker=Tinba" -> "malpedia=Tinba" [label="similar",dir="both"];"tool=Tinba" [label="tool\nTinba",shape=box,style=filled,color=deepskyblue];"tool=Tinba" -> "exploit-kit=Hunter" [label="similar",dir="both"];"exploit-kit=Hunter" [label="exploit-kit\nHunter",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/5594b171-32ec-4145-b712-e7701effffdd.png b/static/graphs/5594b171-32ec-4145-b712-e7701effffdd.png new file mode 100644 index 0000000..778c5e7 Binary files /dev/null and b/static/graphs/5594b171-32ec-4145-b712-e7701effffdd.png differ diff --git a/static/graphs/56648de3-8947-4559-90c4-eda10acc0f5a b/static/graphs/56648de3-8947-4559-90c4-eda10acc0f5a new file mode 100644 index 0000000..c74cca2 --- /dev/null +++ b/static/graphs/56648de3-8947-4559-90c4-eda10acc0f5a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Keychain Mitigation - T1142" [label="mitre-enterprise-attack-course-of-action\nKeychain Mitigation - T1142",shape=ellipse];"mitre-enterprise-attack-course-of-action=Keychain Mitigation - T1142" -> "mitre-enterprise-attack-attack-pattern=Keychain - T1142" [label="mitigates",];} diff --git a/static/graphs/56648de3-8947-4559-90c4-eda10acc0f5a.png b/static/graphs/56648de3-8947-4559-90c4-eda10acc0f5a.png new file mode 100644 index 0000000..5a931a6 Binary files /dev/null and b/static/graphs/56648de3-8947-4559-90c4-eda10acc0f5a.png differ diff --git a/static/graphs/56660521-6db4-4e5a-a927-464f22954b7c b/static/graphs/56660521-6db4-4e5a-a927-464f22954b7c new file mode 100644 index 0000000..6d9da6f --- /dev/null +++ b/static/graphs/56660521-6db4-4e5a-a927-464f22954b7c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=X-Agent - MOB-S0030" [label="mitre-mobile-attack-malware\nX-Agent - MOB-S0030",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" -> "mitre-enterprise-attack-malware=CHOPSTICK - S0023" [label="similar",dir="both"];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" -> "tool=CHOPSTICK" [label="similar",dir="both"];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" -> "tool=X-Agent" [label="similar",dir="both"];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" -> "malpedia=X-Agent (Android)" [label="similar",dir="both"];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" -> "mitre-mobile-attack-attack-pattern=Repackaged Application - MOB-T1047" [label="uses",];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" -> "mitre-mobile-attack-attack-pattern=Location Tracking - MOB-T1033" [label="uses",];"mitre-enterprise-attack-malware=CHOPSTICK - S0023" [label="mitre-enterprise-attack-malware\nCHOPSTICK - S0023",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CHOPSTICK - S0023" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="uses",];"tool=CHOPSTICK" [label="tool\nCHOPSTICK",shape=box,style=filled,color=deepskyblue];"tool=X-Agent" [label="tool\nX-Agent",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/56660521-6db4-4e5a-a927-464f22954b7c.png b/static/graphs/56660521-6db4-4e5a-a927-464f22954b7c.png new file mode 100644 index 0000000..904fd81 Binary files /dev/null and b/static/graphs/56660521-6db4-4e5a-a927-464f22954b7c.png differ diff --git a/static/graphs/56b37b05-72e7-4a89-ba8a-61ce45269a8c b/static/graphs/56b37b05-72e7-4a89-ba8a-61ce45269a8c new file mode 100644 index 0000000..2709733 --- /dev/null +++ b/static/graphs/56b37b05-72e7-4a89-ba8a-61ce45269a8c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Stone Panda" [label="threat-actor\nStone Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Stone Panda" -> "mitre-enterprise-attack-intrusion-set=menuPass - G0045" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=menuPass - G0045" [label="mitre-enterprise-attack-intrusion-set\nmenuPass - G0045",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=menuPass - G0045" -> "mitre-enterprise-attack-attack-pattern=Windows Management Instrumentation - T1047" [label="uses",];} diff --git a/static/graphs/56b37b05-72e7-4a89-ba8a-61ce45269a8c.png b/static/graphs/56b37b05-72e7-4a89-ba8a-61ce45269a8c.png new file mode 100644 index 0000000..0a948a8 Binary files /dev/null and b/static/graphs/56b37b05-72e7-4a89-ba8a-61ce45269a8c.png differ diff --git a/static/graphs/56db6ccc-433d-4411-8383-c3fd7053e2c8 b/static/graphs/56db6ccc-433d-4411-8383-c3fd7053e2c8 new file mode 100644 index 0000000..53195f6 --- /dev/null +++ b/static/graphs/56db6ccc-433d-4411-8383-c3fd7053e2c8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Execution through API Mitigation - T1106" [label="mitre-enterprise-attack-course-of-action\nExecution through API Mitigation - T1106",shape=ellipse];"mitre-enterprise-attack-course-of-action=Execution through API Mitigation - T1106" -> "mitre-enterprise-attack-attack-pattern=Execution through API - T1106" [label="mitigates",];} diff --git a/static/graphs/56db6ccc-433d-4411-8383-c3fd7053e2c8.png b/static/graphs/56db6ccc-433d-4411-8383-c3fd7053e2c8.png new file mode 100644 index 0000000..29b0eff Binary files /dev/null and b/static/graphs/56db6ccc-433d-4411-8383-c3fd7053e2c8.png differ diff --git a/static/graphs/56f46b17-8cfa-46c0-b501-dd52fef394e2 b/static/graphs/56f46b17-8cfa-46c0-b501-dd52fef394e2 new file mode 100644 index 0000000..21a80ff --- /dev/null +++ b/static/graphs/56f46b17-8cfa-46c0-b501-dd52fef394e2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=ASPXSpy - S0073" [label="mitre-enterprise-attack-malware\nASPXSpy - S0073",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ASPXSpy - S0073" -> "mitre-enterprise-attack-attack-pattern=Web Shell - T1100" [label="uses",];} diff --git a/static/graphs/56f46b17-8cfa-46c0-b501-dd52fef394e2.png b/static/graphs/56f46b17-8cfa-46c0-b501-dd52fef394e2.png new file mode 100644 index 0000000..38b02ff Binary files /dev/null and b/static/graphs/56f46b17-8cfa-46c0-b501-dd52fef394e2.png differ diff --git a/static/graphs/57019a80-8523-46b6-be7d-f763a15a2cc6 b/static/graphs/57019a80-8523-46b6-be7d-f763a15a2cc6 new file mode 100644 index 0000000..db058bf --- /dev/null +++ b/static/graphs/57019a80-8523-46b6-be7d-f763a15a2cc6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Scripting Mitigation - T1064" [label="mitre-enterprise-attack-course-of-action\nScripting Mitigation - T1064",shape=ellipse];"mitre-enterprise-attack-course-of-action=Scripting Mitigation - T1064" -> "mitre-enterprise-attack-attack-pattern=Scripting - T1064" [label="mitigates",];} diff --git a/static/graphs/57019a80-8523-46b6-be7d-f763a15a2cc6.png b/static/graphs/57019a80-8523-46b6-be7d-f763a15a2cc6.png new file mode 100644 index 0000000..7d316ed Binary files /dev/null and b/static/graphs/57019a80-8523-46b6-be7d-f763a15a2cc6.png differ diff --git a/static/graphs/5744f91a-d2d8-4f92-920f-943dd80c578f b/static/graphs/5744f91a-d2d8-4f92-920f-943dd80c578f new file mode 100644 index 0000000..498ac6c --- /dev/null +++ b/static/graphs/5744f91a-d2d8-4f92-920f-943dd80c578f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"microsoft-activity-group=PROMETHIUM" [label="microsoft-activity-group\nPROMETHIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=PROMETHIUM" -> "mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" [label="similar",dir="both"];"microsoft-activity-group=PROMETHIUM" -> "threat-actor=PROMETHIUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" [label="mitre-enterprise-attack-intrusion-set\nPROMETHIUM - G0056",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" -> "mitre-enterprise-attack-malware=Truvasys - S0178" [label="uses",];"threat-actor=PROMETHIUM" [label="threat-actor\nPROMETHIUM",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=Truvasys - S0178" [label="mitre-enterprise-attack-malware\nTruvasys - S0178",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Truvasys - S0178" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];} diff --git a/static/graphs/5744f91a-d2d8-4f92-920f-943dd80c578f.png b/static/graphs/5744f91a-d2d8-4f92-920f-943dd80c578f.png new file mode 100644 index 0000000..cc3bd8b Binary files /dev/null and b/static/graphs/5744f91a-d2d8-4f92-920f-943dd80c578f.png differ diff --git a/static/graphs/57b221bc-7ed6-4080-bc66-813d17009485 b/static/graphs/57b221bc-7ed6-4080-bc66-813d17009485 new file mode 100644 index 0000000..2a1fb27 --- /dev/null +++ b/static/graphs/57b221bc-7ed6-4080-bc66-813d17009485 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Babar" [label="tool\nBabar",shape=box,style=filled,color=deepskyblue];"tool=Babar" -> "malpedia=Babar" [label="similar",dir="both"];} diff --git a/static/graphs/57b221bc-7ed6-4080-bc66-813d17009485.png b/static/graphs/57b221bc-7ed6-4080-bc66-813d17009485.png new file mode 100644 index 0000000..c700d15 Binary files /dev/null and b/static/graphs/57b221bc-7ed6-4080-bc66-813d17009485.png differ diff --git a/static/graphs/57c5df76-e72f-41b9-be29-89395f83a77c b/static/graphs/57c5df76-e72f-41b9-be29-89395f83a77c new file mode 100644 index 0000000..8e80947 --- /dev/null +++ b/static/graphs/57c5df76-e72f-41b9-be29-89395f83a77c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=PadCrypt" [label="ransomware\nPadCrypt",shape=box,style=filled,color=deepskyblue];"ransomware=PadCrypt" -> "malpedia=PadCrypt" [label="similar",dir="both"];} diff --git a/static/graphs/57c5df76-e72f-41b9-be29-89395f83a77c.png b/static/graphs/57c5df76-e72f-41b9-be29-89395f83a77c.png new file mode 100644 index 0000000..123dcf8 Binary files /dev/null and b/static/graphs/57c5df76-e72f-41b9-be29-89395f83a77c.png differ diff --git a/static/graphs/57dd0828-79d7-11e8-a7d8-57db14e1ef24 b/static/graphs/57dd0828-79d7-11e8-a7d8-57db14e1ef24 new file mode 100644 index 0000000..b34994c --- /dev/null +++ b/static/graphs/57dd0828-79d7-11e8-a7d8-57db14e1ef24 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=DDKONG" [label="tool\nDDKONG",shape=box,style=filled,color=deepskyblue];"tool=DDKONG" -> "malpedia=DDKONG" [label="similar",dir="both"];} diff --git a/static/graphs/57dd0828-79d7-11e8-a7d8-57db14e1ef24.png b/static/graphs/57dd0828-79d7-11e8-a7d8-57db14e1ef24.png new file mode 100644 index 0000000..b40c707 Binary files /dev/null and b/static/graphs/57dd0828-79d7-11e8-a7d8-57db14e1ef24.png differ diff --git a/static/graphs/587589df-ee42-43f4-9480-c65d6e1d7e0f b/static/graphs/587589df-ee42-43f4-9480-c65d6e1d7e0f new file mode 100644 index 0000000..0e79edb --- /dev/null +++ b/static/graphs/587589df-ee42-43f4-9480-c65d6e1d7e0f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Cyber SpLiTTer Vbs" [label="ransomware\nCyber SpLiTTer Vbs",shape=box,style=filled,color=deepskyblue];"ransomware=Cyber SpLiTTer Vbs" -> "malpedia=CyberSplitter" [label="similar",dir="both"];} diff --git a/static/graphs/587589df-ee42-43f4-9480-c65d6e1d7e0f.png b/static/graphs/587589df-ee42-43f4-9480-c65d6e1d7e0f.png new file mode 100644 index 0000000..2b4725e Binary files /dev/null and b/static/graphs/587589df-ee42-43f4-9480-c65d6e1d7e0f.png differ diff --git a/static/graphs/58adaaa8-f1e8-4606-9a08-422e568461eb b/static/graphs/58adaaa8-f1e8-4606-9a08-422e568461eb new file mode 100644 index 0000000..9994340 --- /dev/null +++ b/static/graphs/58adaaa8-f1e8-4606-9a08-422e568461eb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=SHOTPUT - S0063" [label="mitre-enterprise-attack-malware\nSHOTPUT - S0063",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SHOTPUT - S0063" -> "tool=Pirpi" [label="similar",dir="both"];"mitre-enterprise-attack-malware=SHOTPUT - S0063" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"tool=Pirpi" [label="tool\nPirpi",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/58adaaa8-f1e8-4606-9a08-422e568461eb.png b/static/graphs/58adaaa8-f1e8-4606-9a08-422e568461eb.png new file mode 100644 index 0000000..80eb439 Binary files /dev/null and b/static/graphs/58adaaa8-f1e8-4606-9a08-422e568461eb.png differ diff --git a/static/graphs/58b24db2-79d7-11e8-9b1b-bbdbc798af4f b/static/graphs/58b24db2-79d7-11e8-9b1b-bbdbc798af4f new file mode 100644 index 0000000..a9d8bed --- /dev/null +++ b/static/graphs/58b24db2-79d7-11e8-9b1b-bbdbc798af4f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=PLAINTEE" [label="tool\nPLAINTEE",shape=box,style=filled,color=deepskyblue];"tool=PLAINTEE" -> "malpedia=PLAINTEE" [label="similar",dir="both"];} diff --git a/static/graphs/58b24db2-79d7-11e8-9b1b-bbdbc798af4f.png b/static/graphs/58b24db2-79d7-11e8-9b1b-bbdbc798af4f.png new file mode 100644 index 0000000..d2a3fc9 Binary files /dev/null and b/static/graphs/58b24db2-79d7-11e8-9b1b-bbdbc798af4f.png differ diff --git a/static/graphs/59140a2e-d117-4206-9b2c-2a8662bd9d46 b/static/graphs/59140a2e-d117-4206-9b2c-2a8662bd9d46 new file mode 100644 index 0000000..82b89e6 --- /dev/null +++ b/static/graphs/59140a2e-d117-4206-9b2c-2a8662bd9d46 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Taidoor - G0015" [label="mitre-enterprise-attack-intrusion-set\nTaidoor - G0015",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Taidoor - G0015" -> "mitre-enterprise-attack-attack-pattern=Standard Cryptographic Protocol - T1032" [label="uses",];} diff --git a/static/graphs/59140a2e-d117-4206-9b2c-2a8662bd9d46.png b/static/graphs/59140a2e-d117-4206-9b2c-2a8662bd9d46.png new file mode 100644 index 0000000..2875521 Binary files /dev/null and b/static/graphs/59140a2e-d117-4206-9b2c-2a8662bd9d46.png differ diff --git a/static/graphs/5920464b-e093-4fa0-a275-438dffef228f b/static/graphs/5920464b-e093-4fa0-a275-438dffef228f new file mode 100644 index 0000000..b9c68ff --- /dev/null +++ b/static/graphs/5920464b-e093-4fa0-a275-438dffef228f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=GandCrab" [label="ransomware\nGandCrab",shape=box,style=filled,color=deepskyblue];"ransomware=GandCrab" -> "exploit-kit=Fallout" [label="dropped-by",];"exploit-kit=Fallout" [label="exploit-kit\nFallout",shape=box,style=filled,color=deepskyblue];"exploit-kit=Fallout" -> "ransomware=GandCrab" [label="dropped",];} diff --git a/static/graphs/5920464b-e093-4fa0-a275-438dffef228f.png b/static/graphs/5920464b-e093-4fa0-a275-438dffef228f.png new file mode 100644 index 0000000..6db2fb8 Binary files /dev/null and b/static/graphs/5920464b-e093-4fa0-a275-438dffef228f.png differ diff --git a/static/graphs/59266c02-e3c8-47a6-b00c-bbb50c8975e9 b/static/graphs/59266c02-e3c8-47a6-b00c-bbb50c8975e9 new file mode 100644 index 0000000..c502dc2 --- /dev/null +++ b/static/graphs/59266c02-e3c8-47a6-b00c-bbb50c8975e9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=WellMail" [label="tool\nWellMail",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/59266c02-e3c8-47a6-b00c-bbb50c8975e9.png b/static/graphs/59266c02-e3c8-47a6-b00c-bbb50c8975e9.png new file mode 100644 index 0000000..35c795f Binary files /dev/null and b/static/graphs/59266c02-e3c8-47a6-b00c-bbb50c8975e9.png differ diff --git a/static/graphs/59369f72-3005-4e54-9095-3d00efcece73 b/static/graphs/59369f72-3005-4e54-9095-3d00efcece73 new file mode 100644 index 0000000..9c0dca8 --- /dev/null +++ b/static/graphs/59369f72-3005-4e54-9095-3d00efcece73 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1042" [label="mitre-pre-attack-attack-pattern\nIdentify supply chains - PRE-T1042",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1042" -> "mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1053" [label="related-to",];"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1053" [label="mitre-pre-attack-attack-pattern\nIdentify supply chains - PRE-T1053",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1053" -> "mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1042" [label="related-to",];} diff --git a/static/graphs/59369f72-3005-4e54-9095-3d00efcece73.png b/static/graphs/59369f72-3005-4e54-9095-3d00efcece73.png new file mode 100644 index 0000000..e2bdfeb Binary files /dev/null and b/static/graphs/59369f72-3005-4e54-9095-3d00efcece73.png differ diff --git a/static/graphs/5967cc93-57c9-404a-8ffd-097edfa7bdfc b/static/graphs/5967cc93-57c9-404a-8ffd-097edfa7bdfc new file mode 100644 index 0000000..567629a --- /dev/null +++ b/static/graphs/5967cc93-57c9-404a-8ffd-097edfa7bdfc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Hi-Zor - S0087" [label="mitre-enterprise-attack-malware\nHi-Zor - S0087",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Hi-Zor - S0087" -> "rat=Hi-Zor" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Hi-Zor - S0087" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];"rat=Hi-Zor" [label="rat\nHi-Zor",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/5967cc93-57c9-404a-8ffd-097edfa7bdfc.png b/static/graphs/5967cc93-57c9-404a-8ffd-097edfa7bdfc.png new file mode 100644 index 0000000..7aa9bf7 Binary files /dev/null and b/static/graphs/5967cc93-57c9-404a-8ffd-097edfa7bdfc.png differ diff --git a/static/graphs/59a97b15-8189-4d51-9404-e1ce8ea4a069 b/static/graphs/59a97b15-8189-4d51-9404-e1ce8ea4a069 new file mode 100644 index 0000000..c2dbd37 --- /dev/null +++ b/static/graphs/59a97b15-8189-4d51-9404-e1ce8ea4a069 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=XAgentOSX - S0161" [label="mitre-enterprise-attack-malware\nXAgentOSX - S0161",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=XAgentOSX - S0161" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];} diff --git a/static/graphs/59a97b15-8189-4d51-9404-e1ce8ea4a069.png b/static/graphs/59a97b15-8189-4d51-9404-e1ce8ea4a069.png new file mode 100644 index 0000000..92882c4 Binary files /dev/null and b/static/graphs/59a97b15-8189-4d51-9404-e1ce8ea4a069.png differ diff --git a/static/graphs/59b70721-6fed-4805-afa5-4ff2554bef81 b/static/graphs/59b70721-6fed-4805-afa5-4ff2554bef81 new file mode 100644 index 0000000..a00c458 --- /dev/null +++ b/static/graphs/59b70721-6fed-4805-afa5-4ff2554bef81 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=NetTraveler" [label="tool\nNetTraveler",shape=box,style=filled,color=deepskyblue];"tool=NetTraveler" -> "mitre-enterprise-attack-malware=NetTraveler - S0033" [label="similar",dir="both"];"tool=NetTraveler" -> "malpedia=NetTraveler" [label="similar",dir="both"];"mitre-enterprise-attack-malware=NetTraveler - S0033" [label="mitre-enterprise-attack-malware\nNetTraveler - S0033",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=NetTraveler - S0033" -> "mitre-enterprise-attack-attack-pattern=Application Window Discovery - T1010" [label="uses",];} diff --git a/static/graphs/59b70721-6fed-4805-afa5-4ff2554bef81.png b/static/graphs/59b70721-6fed-4805-afa5-4ff2554bef81.png new file mode 100644 index 0000000..788edc6 Binary files /dev/null and b/static/graphs/59b70721-6fed-4805-afa5-4ff2554bef81.png differ diff --git a/static/graphs/59fb0222-0e7d-4f5f-92ac-e68012fb927d b/static/graphs/59fb0222-0e7d-4f5f-92ac-e68012fb927d new file mode 100644 index 0000000..e2e62fb --- /dev/null +++ b/static/graphs/59fb0222-0e7d-4f5f-92ac-e68012fb927d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=3PARA RAT" [label="rat\n3PARA RAT",shape=box,style=filled,color=deepskyblue];"rat=3PARA RAT" -> "mitre-enterprise-attack-malware=3PARA RAT - S0066" [label="similar",dir="both"];"mitre-enterprise-attack-malware=3PARA RAT - S0066" [label="mitre-enterprise-attack-malware\n3PARA RAT - S0066",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=3PARA RAT - S0066" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];} diff --git a/static/graphs/59fb0222-0e7d-4f5f-92ac-e68012fb927d.png b/static/graphs/59fb0222-0e7d-4f5f-92ac-e68012fb927d.png new file mode 100644 index 0000000..44370c6 Binary files /dev/null and b/static/graphs/59fb0222-0e7d-4f5f-92ac-e68012fb927d.png differ diff --git a/static/graphs/5a22cad7-65fa-4b7a-a7aa-7915a6101efa b/static/graphs/5a22cad7-65fa-4b7a-a7aa-7915a6101efa new file mode 100644 index 0000000..6ec9ee7 --- /dev/null +++ b/static/graphs/5a22cad7-65fa-4b7a-a7aa-7915a6101efa @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=BlackEnergy" [label="tool\nBlackEnergy",shape=box,style=filled,color=deepskyblue];"tool=BlackEnergy" -> "mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="similar",dir="both"];"tool=BlackEnergy" -> "malpedia=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="mitre-enterprise-attack-malware\nBlackEnergy - S0089",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];} diff --git a/static/graphs/5a22cad7-65fa-4b7a-a7aa-7915a6101efa.png b/static/graphs/5a22cad7-65fa-4b7a-a7aa-7915a6101efa.png new file mode 100644 index 0000000..28796a4 Binary files /dev/null and b/static/graphs/5a22cad7-65fa-4b7a-a7aa-7915a6101efa.png differ diff --git a/static/graphs/5a33468d-844d-4b1f-98c9-0e786c556b27 b/static/graphs/5a33468d-844d-4b1f-98c9-0e786c556b27 new file mode 100644 index 0000000..ae43fe8 --- /dev/null +++ b/static/graphs/5a33468d-844d-4b1f-98c9-0e786c556b27 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=MimiPenguin - S0179" [label="mitre-enterprise-attack-tool\nMimiPenguin - S0179",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=MimiPenguin - S0179" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];} diff --git a/static/graphs/5a33468d-844d-4b1f-98c9-0e786c556b27.png b/static/graphs/5a33468d-844d-4b1f-98c9-0e786c556b27.png new file mode 100644 index 0000000..8dfc052 Binary files /dev/null and b/static/graphs/5a33468d-844d-4b1f-98c9-0e786c556b27.png differ diff --git a/static/graphs/5a3a31fe-5a8f-48e1-bff0-a753e5b1be70 b/static/graphs/5a3a31fe-5a8f-48e1-bff0-a753e5b1be70 new file mode 100644 index 0000000..db63e88 --- /dev/null +++ b/static/graphs/5a3a31fe-5a8f-48e1-bff0-a753e5b1be70 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=China Chopper - S0020" [label="mitre-enterprise-attack-malware\nChina Chopper - S0020",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=China Chopper - S0020" -> "mitre-enterprise-attack-attack-pattern=Web Shell - T1100" [label="uses",];} diff --git a/static/graphs/5a3a31fe-5a8f-48e1-bff0-a753e5b1be70.png b/static/graphs/5a3a31fe-5a8f-48e1-bff0-a753e5b1be70.png new file mode 100644 index 0000000..7503bd7 Binary files /dev/null and b/static/graphs/5a3a31fe-5a8f-48e1-bff0-a753e5b1be70.png differ diff --git a/static/graphs/5a3df9d7-82de-445e-a218-406b970600d7 b/static/graphs/5a3df9d7-82de-445e-a218-406b970600d7 new file mode 100644 index 0000000..730b2b6 --- /dev/null +++ b/static/graphs/5a3df9d7-82de-445e-a218-406b970600d7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=RadRAT" [label="rat\nRadRAT",shape=box,style=filled,color=deepskyblue];"rat=RadRAT" -> "malpedia=RadRAT" [label="similar",dir="both"];} diff --git a/static/graphs/5a3df9d7-82de-445e-a218-406b970600d7.png b/static/graphs/5a3df9d7-82de-445e-a218-406b970600d7.png new file mode 100644 index 0000000..2902204 Binary files /dev/null and b/static/graphs/5a3df9d7-82de-445e-a218-406b970600d7.png differ diff --git a/static/graphs/5a63f900-5e7e-4928-a746-dd4558e1df71 b/static/graphs/5a63f900-5e7e-4928-a746-dd4558e1df71 new file mode 100644 index 0000000..f3d39db --- /dev/null +++ b/static/graphs/5a63f900-5e7e-4928-a746-dd4558e1df71 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=netsh - S0108" [label="mitre-enterprise-attack-tool\nnetsh - S0108",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=netsh - S0108" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="uses",];} diff --git a/static/graphs/5a63f900-5e7e-4928-a746-dd4558e1df71.png b/static/graphs/5a63f900-5e7e-4928-a746-dd4558e1df71.png new file mode 100644 index 0000000..c1bbaf6 Binary files /dev/null and b/static/graphs/5a63f900-5e7e-4928-a746-dd4558e1df71.png differ diff --git a/static/graphs/5a84dc36-df0d-4053-9b7c-f0c388a57283 b/static/graphs/5a84dc36-df0d-4053-9b7c-f0c388a57283 new file mode 100644 index 0000000..6630e33 --- /dev/null +++ b/static/graphs/5a84dc36-df0d-4053-9b7c-f0c388a57283 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=CALENDAR - S0025" [label="mitre-enterprise-attack-malware\nCALENDAR - S0025",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CALENDAR - S0025" -> "tool=CALENDAR" [label="similar",dir="both"];"mitre-enterprise-attack-malware=CALENDAR - S0025" -> "mitre-enterprise-attack-attack-pattern=Web Service - T1102" [label="uses",];"tool=CALENDAR" [label="tool\nCALENDAR",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/5a84dc36-df0d-4053-9b7c-f0c388a57283.png b/static/graphs/5a84dc36-df0d-4053-9b7c-f0c388a57283.png new file mode 100644 index 0000000..50f376c Binary files /dev/null and b/static/graphs/5a84dc36-df0d-4053-9b7c-f0c388a57283.png differ diff --git a/static/graphs/5abb12e7-5066-4f84-a109-49a037205c76 b/static/graphs/5abb12e7-5066-4f84-a109-49a037205c76 new file mode 100644 index 0000000..22e6aa6 --- /dev/null +++ b/static/graphs/5abb12e7-5066-4f84-a109-49a037205c76 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Suckfly" [label="threat-actor\nSuckfly",shape=octagon,style=filled,color=indianred1];"threat-actor=Suckfly" -> "mitre-enterprise-attack-intrusion-set=Suckfly - G0039" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Suckfly - G0039" [label="mitre-enterprise-attack-intrusion-set\nSuckfly - G0039",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Suckfly - G0039" -> "mitre-enterprise-attack-attack-pattern=Code Signing - T1116" [label="uses",];} diff --git a/static/graphs/5abb12e7-5066-4f84-a109-49a037205c76.png b/static/graphs/5abb12e7-5066-4f84-a109-49a037205c76.png new file mode 100644 index 0000000..d66a634 Binary files /dev/null and b/static/graphs/5abb12e7-5066-4f84-a109-49a037205c76.png differ diff --git a/static/graphs/5b42af8e-8fdc-11e8-bf48-f32ff64d5502 b/static/graphs/5b42af8e-8fdc-11e8-bf48-f32ff64d5502 new file mode 100644 index 0000000..9532f14 --- /dev/null +++ b/static/graphs/5b42af8e-8fdc-11e8-bf48-f32ff64d5502 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Kronos" [label="banker\nKronos",shape=box,style=filled,color=deepskyblue];"banker=Kronos" -> "malpedia=Kronos" [label="similar",dir="both"];} diff --git a/static/graphs/5b42af8e-8fdc-11e8-bf48-f32ff64d5502.png b/static/graphs/5b42af8e-8fdc-11e8-bf48-f32ff64d5502.png new file mode 100644 index 0000000..4f9da04 Binary files /dev/null and b/static/graphs/5b42af8e-8fdc-11e8-bf48-f32ff64d5502.png differ diff --git a/static/graphs/5b4b6980-3bc7-11e8-84d6-879aaac37dd9 b/static/graphs/5b4b6980-3bc7-11e8-84d6-879aaac37dd9 new file mode 100644 index 0000000..98b1497 --- /dev/null +++ b/static/graphs/5b4b6980-3bc7-11e8-84d6-879aaac37dd9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Leviathan" [label="threat-actor\nLeviathan",shape=octagon,style=filled,color=indianred1];"threat-actor=Leviathan" -> "mitre-enterprise-attack-intrusion-set=Leviathan - G0065" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Leviathan - G0065" [label="mitre-enterprise-attack-intrusion-set\nLeviathan - G0065",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Leviathan - G0065" -> "mitre-enterprise-attack-attack-pattern=Windows Management Instrumentation Event Subscription - T1084" [label="uses",];} diff --git a/static/graphs/5b4b6980-3bc7-11e8-84d6-879aaac37dd9.png b/static/graphs/5b4b6980-3bc7-11e8-84d6-879aaac37dd9.png new file mode 100644 index 0000000..f157033 Binary files /dev/null and b/static/graphs/5b4b6980-3bc7-11e8-84d6-879aaac37dd9.png differ diff --git a/static/graphs/5b4ee3ea-eee3-4c8e-8323-85ae32658754 b/static/graphs/5b4ee3ea-eee3-4c8e-8323-85ae32658754 new file mode 100644 index 0000000..a09e1c6 --- /dev/null +++ b/static/graphs/5b4ee3ea-eee3-4c8e-8323-85ae32658754 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Sofacy" [label="threat-actor\nSofacy",shape=octagon,style=filled,color=indianred1];"threat-actor=Sofacy" -> "mitre-pre-attack-intrusion-set=APT28 - G0007" [label="similar",dir="both"];"threat-actor=Sofacy" -> "microsoft-activity-group=STRONTIUM" [label="similar",dir="both"];"microsoft-activity-group=STRONTIUM" [label="microsoft-activity-group\nSTRONTIUM",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT28 - G0007" [label="mitre-enterprise-attack-intrusion-set\nAPT28 - G0007",shape=octagon,style=filled,color=indianred1];"mitre-mobile-attack-intrusion-set=APT28 - G0007" [label="mitre-mobile-attack-intrusion-set\nAPT28 - G0007",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT28 - G0007" [label="mitre-pre-attack-intrusion-set\nAPT28 - G0007",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT28 - G0007" -> "mitre-enterprise-attack-attack-pattern=Rundll32 - T1085" [label="uses",];"mitre-pre-attack-intrusion-set=APT28 - G0007" -> "mitre-enterprise-attack-attack-pattern=Spearphishing Attachment - T1193" [label="uses",];} diff --git a/static/graphs/5b4ee3ea-eee3-4c8e-8323-85ae32658754.png b/static/graphs/5b4ee3ea-eee3-4c8e-8323-85ae32658754.png new file mode 100644 index 0000000..ee3279d Binary files /dev/null and b/static/graphs/5b4ee3ea-eee3-4c8e-8323-85ae32658754.png differ diff --git a/static/graphs/5b6ce031-bb86-407a-9984-2b9700ac4549 b/static/graphs/5b6ce031-bb86-407a-9984-2b9700ac4549 new file mode 100644 index 0000000..7dfb54d --- /dev/null +++ b/static/graphs/5b6ce031-bb86-407a-9984-2b9700ac4549 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Identify business relationships - PRE-T1049" [label="mitre-pre-attack-attack-pattern\nIdentify business relationships - PRE-T1049",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify business relationships - PRE-T1049" -> "mitre-pre-attack-attack-pattern=Identify business relationships - PRE-T1060" [label="related-to",];"mitre-pre-attack-attack-pattern=Identify business relationships - PRE-T1060" [label="mitre-pre-attack-attack-pattern\nIdentify business relationships - PRE-T1060",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify business relationships - PRE-T1060" -> "mitre-pre-attack-attack-pattern=Identify business relationships - PRE-T1049" [label="related-to",];} diff --git a/static/graphs/5b6ce031-bb86-407a-9984-2b9700ac4549.png b/static/graphs/5b6ce031-bb86-407a-9984-2b9700ac4549.png new file mode 100644 index 0000000..1976074 Binary files /dev/null and b/static/graphs/5b6ce031-bb86-407a-9984-2b9700ac4549.png differ diff --git a/static/graphs/5b930a23-7d88-481f-8791-abc7b3dd93d2 b/static/graphs/5b930a23-7d88-481f-8791-abc7b3dd93d2 new file mode 100644 index 0000000..ee49edb --- /dev/null +++ b/static/graphs/5b930a23-7d88-481f-8791-abc7b3dd93d2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Konni" [label="rat\nKonni",shape=box,style=filled,color=deepskyblue];"rat=Konni" -> "tool=KONNI" [label="similar",dir="both"];"rat=Konni" -> "malpedia=Konni" [label="similar",dir="both"];"tool=KONNI" [label="tool\nKONNI",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/5b930a23-7d88-481f-8791-abc7b3dd93d2.png b/static/graphs/5b930a23-7d88-481f-8791-abc7b3dd93d2.png new file mode 100644 index 0000000..e49af5f Binary files /dev/null and b/static/graphs/5b930a23-7d88-481f-8791-abc7b3dd93d2.png differ diff --git a/static/graphs/5b9dc67e-bae4-44f3-b58d-6d842a744104 b/static/graphs/5b9dc67e-bae4-44f3-b58d-6d842a744104 new file mode 100644 index 0000000..0a253cc --- /dev/null +++ b/static/graphs/5b9dc67e-bae4-44f3-b58d-6d842a744104 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=ZXShell" [label="tool\nZXShell",shape=box,style=filled,color=deepskyblue];"tool=ZXShell" -> "malpedia=ZXShell" [label="similar",dir="both"];} diff --git a/static/graphs/5b9dc67e-bae4-44f3-b58d-6d842a744104.png b/static/graphs/5b9dc67e-bae4-44f3-b58d-6d842a744104.png new file mode 100644 index 0000000..0d07dca Binary files /dev/null and b/static/graphs/5b9dc67e-bae4-44f3-b58d-6d842a744104.png differ diff --git a/static/graphs/5bc62523-dc80-46b4-b5cb-9caf44c11552 b/static/graphs/5bc62523-dc80-46b4-b5cb-9caf44c11552 new file mode 100644 index 0000000..22572dd --- /dev/null +++ b/static/graphs/5bc62523-dc80-46b4-b5cb-9caf44c11552 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=CpuMeaner" [label="tool\nCpuMeaner",shape=box,style=filled,color=deepskyblue];"tool=CpuMeaner" -> "malpedia=CpuMeaner" [label="similar",dir="both"];} diff --git a/static/graphs/5bc62523-dc80-46b4-b5cb-9caf44c11552.png b/static/graphs/5bc62523-dc80-46b4-b5cb-9caf44c11552.png new file mode 100644 index 0000000..6b2bfcd Binary files /dev/null and b/static/graphs/5bc62523-dc80-46b4-b5cb-9caf44c11552.png differ diff --git a/static/graphs/5bcd5511-6756-4824-a692-e8bb109364af b/static/graphs/5bcd5511-6756-4824-a692-e8bb109364af new file mode 100644 index 0000000..d6fba02 --- /dev/null +++ b/static/graphs/5bcd5511-6756-4824-a692-e8bb109364af @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Chaos - S0220" [label="mitre-enterprise-attack-malware\nChaos - S0220",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Chaos - S0220" -> "mitre-enterprise-attack-attack-pattern=Custom Command and Control Protocol - T1094" [label="uses",];} diff --git a/static/graphs/5bcd5511-6756-4824-a692-e8bb109364af.png b/static/graphs/5bcd5511-6756-4824-a692-e8bb109364af.png new file mode 100644 index 0000000..bcea812 Binary files /dev/null and b/static/graphs/5bcd5511-6756-4824-a692-e8bb109364af.png differ diff --git a/static/graphs/5be33fef-39c0-4532-84ee-bea31e1b5324 b/static/graphs/5be33fef-39c0-4532-84ee-bea31e1b5324 new file mode 100644 index 0000000..92f6ed4 --- /dev/null +++ b/static/graphs/5be33fef-39c0-4532-84ee-bea31e1b5324 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=ISMInjector - S0189" [label="mitre-enterprise-attack-malware\nISMInjector - S0189",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ISMInjector - S0189" -> "mitre-enterprise-attack-attack-pattern=Scheduled Task - T1053" [label="uses",];} diff --git a/static/graphs/5be33fef-39c0-4532-84ee-bea31e1b5324.png b/static/graphs/5be33fef-39c0-4532-84ee-bea31e1b5324.png new file mode 100644 index 0000000..357ca0e Binary files /dev/null and b/static/graphs/5be33fef-39c0-4532-84ee-bea31e1b5324.png differ diff --git a/static/graphs/5c167af7-c2cb-42c8-ae67-3fb275bf8488 b/static/graphs/5c167af7-c2cb-42c8-ae67-3fb275bf8488 new file mode 100644 index 0000000..a054b6c --- /dev/null +++ b/static/graphs/5c167af7-c2cb-42c8-ae67-3fb275bf8488 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Timestomp Mitigation - T1099" [label="mitre-enterprise-attack-course-of-action\nTimestomp Mitigation - T1099",shape=ellipse];"mitre-enterprise-attack-course-of-action=Timestomp Mitigation - T1099" -> "mitre-enterprise-attack-attack-pattern=Timestomp - T1099" [label="mitigates",];} diff --git a/static/graphs/5c167af7-c2cb-42c8-ae67-3fb275bf8488.png b/static/graphs/5c167af7-c2cb-42c8-ae67-3fb275bf8488.png new file mode 100644 index 0000000..cc9c42d Binary files /dev/null and b/static/graphs/5c167af7-c2cb-42c8-ae67-3fb275bf8488.png differ diff --git a/static/graphs/5c2eeaec-25e3-11e8-9d28-7f64aba5b173 b/static/graphs/5c2eeaec-25e3-11e8-9d28-7f64aba5b173 new file mode 100644 index 0000000..8804b19 --- /dev/null +++ b/static/graphs/5c2eeaec-25e3-11e8-9d28-7f64aba5b173 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Neuron" [label="tool\nNeuron",shape=box,style=filled,color=deepskyblue];"tool=Neuron" -> "malpedia=Neuron" [label="similar",dir="both"];} diff --git a/static/graphs/5c2eeaec-25e3-11e8-9d28-7f64aba5b173.png b/static/graphs/5c2eeaec-25e3-11e8-9d28-7f64aba5b173.png new file mode 100644 index 0000000..661f1a3 Binary files /dev/null and b/static/graphs/5c2eeaec-25e3-11e8-9d28-7f64aba5b173.png differ diff --git a/static/graphs/5c49bc54-9929-48ca-b581-7018219b5a97 b/static/graphs/5c49bc54-9929-48ca-b581-7018219b5a97 new file mode 100644 index 0000000..549a431 --- /dev/null +++ b/static/graphs/5c49bc54-9929-48ca-b581-7018219b5a97 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Account Discovery Mitigation - T1087" [label="mitre-enterprise-attack-course-of-action\nAccount Discovery Mitigation - T1087",shape=ellipse];"mitre-enterprise-attack-course-of-action=Account Discovery Mitigation - T1087" -> "mitre-enterprise-attack-attack-pattern=Account Discovery - T1087" [label="mitigates",];} diff --git a/static/graphs/5c49bc54-9929-48ca-b581-7018219b5a97.png b/static/graphs/5c49bc54-9929-48ca-b581-7018219b5a97.png new file mode 100644 index 0000000..201431c Binary files /dev/null and b/static/graphs/5c49bc54-9929-48ca-b581-7018219b5a97.png differ diff --git a/static/graphs/5c6ed2dc-37f4-40ea-b2e1-4c76140a388c b/static/graphs/5c6ed2dc-37f4-40ea-b2e1-4c76140a388c new file mode 100644 index 0000000..a47f9e2 --- /dev/null +++ b/static/graphs/5c6ed2dc-37f4-40ea-b2e1-4c76140a388c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=PUNCHBUGGY - S0196" [label="mitre-enterprise-attack-malware\nPUNCHBUGGY - S0196",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PUNCHBUGGY - S0196" -> "mitre-enterprise-attack-attack-pattern=Masquerading - T1036" [label="uses",];} diff --git a/static/graphs/5c6ed2dc-37f4-40ea-b2e1-4c76140a388c.png b/static/graphs/5c6ed2dc-37f4-40ea-b2e1-4c76140a388c.png new file mode 100644 index 0000000..2c53949 Binary files /dev/null and b/static/graphs/5c6ed2dc-37f4-40ea-b2e1-4c76140a388c.png differ diff --git a/static/graphs/5c96ebd0-d77f-479c-bc8f-247038f901f0 b/static/graphs/5c96ebd0-d77f-479c-bc8f-247038f901f0 new file mode 100644 index 0000000..6fdb3c3 --- /dev/null +++ b/static/graphs/5c96ebd0-d77f-479c-bc8f-247038f901f0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Information Gathering:Scanning" [label="rsit\nInformation Gathering:Scanning",shape=ellipse];"rsit=Information Gathering:Scanning" -> "mitre-enterprise-attack-attack-pattern=Network Service Scanning - T1046" [label="similar",dir="both"];} diff --git a/static/graphs/5c96ebd0-d77f-479c-bc8f-247038f901f0.png b/static/graphs/5c96ebd0-d77f-479c-bc8f-247038f901f0.png new file mode 100644 index 0000000..43eedcf Binary files /dev/null and b/static/graphs/5c96ebd0-d77f-479c-bc8f-247038f901f0.png differ diff --git a/static/graphs/5cbe0d3b-6fb1-471f-b591-4b192915116d b/static/graphs/5cbe0d3b-6fb1-471f-b591-4b192915116d new file mode 100644 index 0000000..9759c44 --- /dev/null +++ b/static/graphs/5cbe0d3b-6fb1-471f-b591-4b192915116d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Suckfly - G0039" [label="mitre-enterprise-attack-intrusion-set\nSuckfly - G0039",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Suckfly - G0039" -> "threat-actor=Suckfly" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Suckfly - G0039" -> "mitre-enterprise-attack-attack-pattern=Code Signing - T1116" [label="uses",];"threat-actor=Suckfly" [label="threat-actor\nSuckfly",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/5cbe0d3b-6fb1-471f-b591-4b192915116d.png b/static/graphs/5cbe0d3b-6fb1-471f-b591-4b192915116d.png new file mode 100644 index 0000000..19841d7 Binary files /dev/null and b/static/graphs/5cbe0d3b-6fb1-471f-b591-4b192915116d.png differ diff --git a/static/graphs/5ce18513-bd12-4689-a705-634cf727162e b/static/graphs/5ce18513-bd12-4689-a705-634cf727162e new file mode 100644 index 0000000..e61c761 --- /dev/null +++ b/static/graphs/5ce18513-bd12-4689-a705-634cf727162e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Beds Protector" [label="tool\nBeds Protector",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/5ce18513-bd12-4689-a705-634cf727162e.png b/static/graphs/5ce18513-bd12-4689-a705-634cf727162e.png new file mode 100644 index 0000000..f01d4b2 Binary files /dev/null and b/static/graphs/5ce18513-bd12-4689-a705-634cf727162e.png differ diff --git a/static/graphs/5ce5392a-3a6c-4e07-9df3-9b6a9159ac45 b/static/graphs/5ce5392a-3a6c-4e07-9df3-9b6a9159ac45 new file mode 100644 index 0000000..501bfeb --- /dev/null +++ b/static/graphs/5ce5392a-3a6c-4e07-9df3-9b6a9159ac45 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Putter Panda - G0024" [label="mitre-enterprise-attack-intrusion-set\nPutter Panda - G0024",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Putter Panda - G0024" -> "threat-actor=Putter Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Putter Panda - G0024" -> "mitre-enterprise-attack-malware=3PARA RAT - S0066" [label="uses",];"mitre-enterprise-attack-malware=3PARA RAT - S0066" [label="mitre-enterprise-attack-malware\n3PARA RAT - S0066",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=3PARA RAT - S0066" -> "rat=3PARA RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=3PARA RAT - S0066" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];"threat-actor=Putter Panda" [label="threat-actor\nPutter Panda",shape=octagon,style=filled,color=indianred1];"rat=3PARA RAT" [label="rat\n3PARA RAT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/5ce5392a-3a6c-4e07-9df3-9b6a9159ac45.png b/static/graphs/5ce5392a-3a6c-4e07-9df3-9b6a9159ac45.png new file mode 100644 index 0000000..4dd65fa Binary files /dev/null and b/static/graphs/5ce5392a-3a6c-4e07-9df3-9b6a9159ac45.png differ diff --git a/static/graphs/5d2dd6ad-6bb2-45d3-b295-e125d3399c8d b/static/graphs/5d2dd6ad-6bb2-45d3-b295-e125d3399c8d new file mode 100644 index 0000000..1e11fab --- /dev/null +++ b/static/graphs/5d2dd6ad-6bb2-45d3-b295-e125d3399c8d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=RARSTONE" [label="tool\nRARSTONE",shape=box,style=filled,color=deepskyblue];"tool=RARSTONE" -> "mitre-enterprise-attack-malware=RARSTONE - S0055" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RARSTONE - S0055" [label="mitre-enterprise-attack-malware\nRARSTONE - S0055",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RARSTONE - S0055" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/5d2dd6ad-6bb2-45d3-b295-e125d3399c8d.png b/static/graphs/5d2dd6ad-6bb2-45d3-b295-e125d3399c8d.png new file mode 100644 index 0000000..19218f2 Binary files /dev/null and b/static/graphs/5d2dd6ad-6bb2-45d3-b295-e125d3399c8d.png differ diff --git a/static/graphs/5ddf81ea-2c06-497b-8c30-5f1ab89a40f9 b/static/graphs/5ddf81ea-2c06-497b-8c30-5f1ab89a40f9 new file mode 100644 index 0000000..8b69bff --- /dev/null +++ b/static/graphs/5ddf81ea-2c06-497b-8c30-5f1ab89a40f9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=MazarBOT - MOB-S0019" [label="mitre-mobile-attack-malware\nMazarBOT - MOB-S0019",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=MazarBOT - MOB-S0019" -> "mitre-mobile-attack-attack-pattern=Capture SMS Messages - MOB-T1015" [label="uses",];} diff --git a/static/graphs/5ddf81ea-2c06-497b-8c30-5f1ab89a40f9.png b/static/graphs/5ddf81ea-2c06-497b-8c30-5f1ab89a40f9.png new file mode 100644 index 0000000..9f949d4 Binary files /dev/null and b/static/graphs/5ddf81ea-2c06-497b-8c30-5f1ab89a40f9.png differ diff --git a/static/graphs/5e0a7cf2-6107-4d5f-9dd0-9df38b1fcba8 b/static/graphs/5e0a7cf2-6107-4d5f-9dd0-9df38b1fcba8 new file mode 100644 index 0000000..0958098 --- /dev/null +++ b/static/graphs/5e0a7cf2-6107-4d5f-9dd0-9df38b1fcba8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Lotus Panda" [label="threat-actor\nLotus Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Lotus Panda" -> "mitre-enterprise-attack-intrusion-set=Naikon - G0019" [label="similar",dir="both"];"threat-actor=Lotus Panda" -> "threat-actor=Naikon" [label="similar",dir="both"];"threat-actor=Lotus Panda" -> "threat-actor=APT 30" [label="similar",dir="both"];"threat-actor=Lotus Panda" -> "mitre-enterprise-attack-intrusion-set=APT30 - G0013" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" [label="mitre-enterprise-attack-intrusion-set\nNaikon - G0019",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" -> "mitre-enterprise-attack-tool=netsh - S0108" [label="uses",];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" [label="mitre-enterprise-attack-intrusion-set\nAPT30 - G0013",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" -> "mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="uses",];"threat-actor=Naikon" [label="threat-actor\nNaikon",shape=octagon,style=filled,color=indianred1];"threat-actor=APT 30" [label="threat-actor\nAPT 30",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="mitre-enterprise-attack-malware\nBACKSPACE - S0031",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "tool=Backspace" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Command and Control Channel - T1041" [label="uses",];"mitre-enterprise-attack-tool=netsh - S0108" [label="mitre-enterprise-attack-tool\nnetsh - S0108",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=netsh - S0108" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="uses",];"tool=Backspace" [label="tool\nBackspace",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/5e0a7cf2-6107-4d5f-9dd0-9df38b1fcba8.png b/static/graphs/5e0a7cf2-6107-4d5f-9dd0-9df38b1fcba8.png new file mode 100644 index 0000000..ea64d3e Binary files /dev/null and b/static/graphs/5e0a7cf2-6107-4d5f-9dd0-9df38b1fcba8.png differ diff --git a/static/graphs/5e15e4ca-0e04-4af1-ab2a-779dbcad545d b/static/graphs/5e15e4ca-0e04-4af1-ab2a-779dbcad545d new file mode 100644 index 0000000..8de1a96 --- /dev/null +++ b/static/graphs/5e15e4ca-0e04-4af1-ab2a-779dbcad545d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Trochilus" [label="tool\nTrochilus",shape=box,style=filled,color=deepskyblue];"tool=Trochilus" -> "rat=Trochilus" [label="similar",dir="both"];"rat=Trochilus" [label="rat\nTrochilus",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/5e15e4ca-0e04-4af1-ab2a-779dbcad545d.png b/static/graphs/5e15e4ca-0e04-4af1-ab2a-779dbcad545d.png new file mode 100644 index 0000000..c9f7079 Binary files /dev/null and b/static/graphs/5e15e4ca-0e04-4af1-ab2a-779dbcad545d.png differ diff --git a/static/graphs/5e595477-2e78-4ce7-ae42-e0b059b17808 b/static/graphs/5e595477-2e78-4ce7-ae42-e0b059b17808 new file mode 100644 index 0000000..39bf4ff --- /dev/null +++ b/static/graphs/5e595477-2e78-4ce7-ae42-e0b059b17808 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=POSHSPY - S0150" [label="mitre-enterprise-attack-malware\nPOSHSPY - S0150",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=POSHSPY - S0150" -> "malpedia=POSHSPY" [label="similar",dir="both"];"mitre-enterprise-attack-malware=POSHSPY - S0150" -> "mitre-enterprise-attack-attack-pattern=Windows Management Instrumentation Event Subscription - T1084" [label="uses",];} diff --git a/static/graphs/5e595477-2e78-4ce7-ae42-e0b059b17808.png b/static/graphs/5e595477-2e78-4ce7-ae42-e0b059b17808.png new file mode 100644 index 0000000..f6e3847 Binary files /dev/null and b/static/graphs/5e595477-2e78-4ce7-ae42-e0b059b17808.png differ diff --git a/static/graphs/5e7ef1dc-7fb6-4913-ac75-e06113b59e0c b/static/graphs/5e7ef1dc-7fb6-4913-ac75-e06113b59e0c new file mode 100644 index 0000000..fabca99 --- /dev/null +++ b/static/graphs/5e7ef1dc-7fb6-4913-ac75-e06113b59e0c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=MiniDuke - S0051" [label="mitre-enterprise-attack-malware\nMiniDuke - S0051",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=MiniDuke - S0051" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/5e7ef1dc-7fb6-4913-ac75-e06113b59e0c.png b/static/graphs/5e7ef1dc-7fb6-4913-ac75-e06113b59e0c.png new file mode 100644 index 0000000..6498b13 Binary files /dev/null and b/static/graphs/5e7ef1dc-7fb6-4913-ac75-e06113b59e0c.png differ diff --git a/static/graphs/5f9f7648-04ba-4a9f-bb4c-2a13e74572bd b/static/graphs/5f9f7648-04ba-4a9f-bb4c-2a13e74572bd new file mode 100644 index 0000000..87ad619 --- /dev/null +++ b/static/graphs/5f9f7648-04ba-4a9f-bb4c-2a13e74572bd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Pteranodon - S0147" [label="mitre-enterprise-attack-malware\nPteranodon - S0147",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Pteranodon - S0147" -> "malpedia=Pteranodon" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Pteranodon - S0147" -> "mitre-enterprise-attack-attack-pattern=Data Staged - T1074" [label="uses",];} diff --git a/static/graphs/5f9f7648-04ba-4a9f-bb4c-2a13e74572bd.png b/static/graphs/5f9f7648-04ba-4a9f-bb4c-2a13e74572bd.png new file mode 100644 index 0000000..e0c3f20 Binary files /dev/null and b/static/graphs/5f9f7648-04ba-4a9f-bb4c-2a13e74572bd.png differ diff --git a/static/graphs/5fc09923-fcff-4e81-9cae-4518ef31cf4d b/static/graphs/5fc09923-fcff-4e81-9cae-4518ef31cf4d new file mode 100644 index 0000000..d45d1f5 --- /dev/null +++ b/static/graphs/5fc09923-fcff-4e81-9cae-4518ef31cf4d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Poseidon Group" [label="threat-actor\nPoseidon Group",shape=octagon,style=filled,color=indianred1];"threat-actor=Poseidon Group" -> "mitre-enterprise-attack-intrusion-set=Poseidon Group - G0033" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Poseidon Group - G0033" [label="mitre-enterprise-attack-intrusion-set\nPoseidon Group - G0033",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Poseidon Group - G0033" -> "mitre-enterprise-attack-attack-pattern=System Service Discovery - T1007" [label="uses",];} diff --git a/static/graphs/5fc09923-fcff-4e81-9cae-4518ef31cf4d.png b/static/graphs/5fc09923-fcff-4e81-9cae-4518ef31cf4d.png new file mode 100644 index 0000000..3c59edb Binary files /dev/null and b/static/graphs/5fc09923-fcff-4e81-9cae-4518ef31cf4d.png differ diff --git a/static/graphs/5fe338c6-723e-43ed-8165-43d95fa93689 b/static/graphs/5fe338c6-723e-43ed-8165-43d95fa93689 new file mode 100644 index 0000000..cb9b0c5 --- /dev/null +++ b/static/graphs/5fe338c6-723e-43ed-8165-43d95fa93689 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Gafgyt" [label="tool\nGafgyt",shape=box,style=filled,color=deepskyblue];"tool=Gafgyt" -> "malpedia=Bashlite" [label="similar",dir="both"];"tool=Gafgyt" -> "botnet=Gafgyt" [label="similar",dir="both"];"botnet=Gafgyt" [label="botnet\nGafgyt",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/5fe338c6-723e-43ed-8165-43d95fa93689.png b/static/graphs/5fe338c6-723e-43ed-8165-43d95fa93689.png new file mode 100644 index 0000000..3989ede Binary files /dev/null and b/static/graphs/5fe338c6-723e-43ed-8165-43d95fa93689.png differ diff --git a/static/graphs/60857664-0671-4b12-ade9-86ee6ecb026a b/static/graphs/60857664-0671-4b12-ade9-86ee6ecb026a new file mode 100644 index 0000000..0da5882 --- /dev/null +++ b/static/graphs/60857664-0671-4b12-ade9-86ee6ecb026a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=Switcher" [label="android\nSwitcher",shape=box,style=filled,color=deepskyblue];"android=Switcher" -> "malpedia=Switcher" [label="similar",dir="both"];} diff --git a/static/graphs/60857664-0671-4b12-ade9-86ee6ecb026a.png b/static/graphs/60857664-0671-4b12-ade9-86ee6ecb026a.png new file mode 100644 index 0000000..e47f303 Binary files /dev/null and b/static/graphs/60857664-0671-4b12-ade9-86ee6ecb026a.png differ diff --git a/static/graphs/6085aad0-1d95-11ea-a140-078d42aced40 b/static/graphs/6085aad0-1d95-11ea-a140-078d42aced40 new file mode 100644 index 0000000..966fcf3 --- /dev/null +++ b/static/graphs/6085aad0-1d95-11ea-a140-078d42aced40 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"microsoft-activity-group=GALLIUM" [label="microsoft-activity-group\nGALLIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=GALLIUM" -> "threat-actor=Operation Soft Cell" [label="similar",dir="both"];"threat-actor=Operation Soft Cell" [label="threat-actor\nOperation Soft Cell",shape=octagon,style=filled,color=indianred1];"threat-actor=Operation Soft Cell" -> "threat-actor=GALLIUM" [label="similar",dir="both"];"threat-actor=GALLIUM" [label="threat-actor\nGALLIUM",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/6085aad0-1d95-11ea-a140-078d42aced40.png b/static/graphs/6085aad0-1d95-11ea-a140-078d42aced40.png new file mode 100644 index 0000000..c9d3b20 Binary files /dev/null and b/static/graphs/6085aad0-1d95-11ea-a140-078d42aced40.png differ diff --git a/static/graphs/60c18d06-7b91-4742-bae3-647845cd9d81 b/static/graphs/60c18d06-7b91-4742-bae3-647845cd9d81 new file mode 100644 index 0000000..09e872d --- /dev/null +++ b/static/graphs/60c18d06-7b91-4742-bae3-647845cd9d81 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=CORESHELL - S0137" [label="mitre-enterprise-attack-malware\nCORESHELL - S0137",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CORESHELL - S0137" -> "tool=SOURFACE" [label="similar",dir="both"];"mitre-enterprise-attack-malware=CORESHELL - S0137" -> "tool=CORESHELL" [label="similar",dir="both"];"mitre-enterprise-attack-malware=CORESHELL - S0137" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"tool=SOURFACE" [label="tool\nSOURFACE",shape=box,style=filled,color=deepskyblue];"tool=SOURFACE" -> "android=Sofacy" [label="similar",dir="both"];"tool=SOURFACE" -> "mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="similar",dir="both"];"tool=SOURFACE" -> "tool=GAMEFISH" [label="similar",dir="both"];"tool=SOURFACE" -> "mitre-enterprise-attack-malware=Komplex - S0162" [label="similar",dir="both"];"tool=SOURFACE" -> "malpedia=Komplex" [label="similar",dir="both"];"tool=SOURFACE" -> "malpedia=Seduploader" [label="similar",dir="both"];"tool=CORESHELL" [label="tool\nCORESHELL",shape=box,style=filled,color=deepskyblue];"android=Sofacy" [label="android\nSofacy",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" [label="mitre-enterprise-attack-malware\nKomplex - S0162",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="mitre-enterprise-attack-malware\nJHUHUGIT - S0044",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Privilege Escalation - T1068" [label="uses",];"tool=GAMEFISH" [label="tool\nGAMEFISH",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/60c18d06-7b91-4742-bae3-647845cd9d81.png b/static/graphs/60c18d06-7b91-4742-bae3-647845cd9d81.png new file mode 100644 index 0000000..56b8ce9 Binary files /dev/null and b/static/graphs/60c18d06-7b91-4742-bae3-647845cd9d81.png differ diff --git a/static/graphs/61184aea-e87b-467d-b36e-cfc75ccb242f b/static/graphs/61184aea-e87b-467d-b36e-cfc75ccb242f new file mode 100644 index 0000000..4d3c1b9 --- /dev/null +++ b/static/graphs/61184aea-e87b-467d-b36e-cfc75ccb242f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Rokku" [label="ransomware\nRokku",shape=box,style=filled,color=deepskyblue];"ransomware=Rokku" -> "malpedia=Rokku" [label="similar",dir="both"];} diff --git a/static/graphs/61184aea-e87b-467d-b36e-cfc75ccb242f.png b/static/graphs/61184aea-e87b-467d-b36e-cfc75ccb242f.png new file mode 100644 index 0000000..8535b65 Binary files /dev/null and b/static/graphs/61184aea-e87b-467d-b36e-cfc75ccb242f.png differ diff --git a/static/graphs/61a17703-7837-4cc9-b022-b5ed6b30efc1 b/static/graphs/61a17703-7837-4cc9-b022-b5ed6b30efc1 new file mode 100644 index 0000000..dd338f5 --- /dev/null +++ b/static/graphs/61a17703-7837-4cc9-b022-b5ed6b30efc1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=TDL4" [label="botnet\nTDL4",shape=box,style=filled,color=deepskyblue];"botnet=TDL4" -> "malpedia=Alureon" [label="similar",dir="both"];} diff --git a/static/graphs/61a17703-7837-4cc9-b022-b5ed6b30efc1.png b/static/graphs/61a17703-7837-4cc9-b022-b5ed6b30efc1.png new file mode 100644 index 0000000..6d86526 Binary files /dev/null and b/static/graphs/61a17703-7837-4cc9-b022-b5ed6b30efc1.png differ diff --git a/static/graphs/61d02387-351a-453e-a575-160a9abc3e04 b/static/graphs/61d02387-351a-453e-a575-160a9abc3e04 new file mode 100644 index 0000000..e8c9326 --- /dev/null +++ b/static/graphs/61d02387-351a-453e-a575-160a9abc3e04 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Re-opened Applications Mitigation - T1164" [label="mitre-enterprise-attack-course-of-action\nRe-opened Applications Mitigation - T1164",shape=ellipse];"mitre-enterprise-attack-course-of-action=Re-opened Applications Mitigation - T1164" -> "mitre-enterprise-attack-attack-pattern=Re-opened Applications - T1164" [label="mitigates",];} diff --git a/static/graphs/61d02387-351a-453e-a575-160a9abc3e04.png b/static/graphs/61d02387-351a-453e-a575-160a9abc3e04.png new file mode 100644 index 0000000..c6f301d Binary files /dev/null and b/static/graphs/61d02387-351a-453e-a575-160a9abc3e04.png differ diff --git a/static/graphs/61d8bba8-7b22-493f-b023-97ffe7f17caf b/static/graphs/61d8bba8-7b22-493f-b023-97ffe7f17caf new file mode 100644 index 0000000..f5a7909 --- /dev/null +++ b/static/graphs/61d8bba8-7b22-493f-b023-97ffe7f17caf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Satan Ransomware" [label="ransomware\nSatan Ransomware",shape=box,style=filled,color=deepskyblue];"ransomware=Satan Ransomware" -> "malpedia=Satan" [label="similar",dir="both"];} diff --git a/static/graphs/61d8bba8-7b22-493f-b023-97ffe7f17caf.png b/static/graphs/61d8bba8-7b22-493f-b023-97ffe7f17caf.png new file mode 100644 index 0000000..0f5fb52 Binary files /dev/null and b/static/graphs/61d8bba8-7b22-493f-b023-97ffe7f17caf.png differ diff --git a/static/graphs/620981e8-49c8-486a-b30c-359702c8ffbc b/static/graphs/620981e8-49c8-486a-b30c-359702c8ffbc new file mode 100644 index 0000000..aa70437 --- /dev/null +++ b/static/graphs/620981e8-49c8-486a-b30c-359702c8ffbc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=Bankosy" [label="android\nBankosy",shape=box,style=filled,color=deepskyblue];"android=Bankosy" -> "tool=Slempo" [label="similar",dir="both"];"android=Bankosy" -> "android=GM Bot" [label="similar",dir="both"];"android=Bankosy" -> "malpedia=Slempo" [label="similar",dir="both"];"android=GM Bot" [label="android\nGM Bot",shape=box,style=filled,color=deepskyblue];"tool=Slempo" [label="tool\nSlempo",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/620981e8-49c8-486a-b30c-359702c8ffbc.png b/static/graphs/620981e8-49c8-486a-b30c-359702c8ffbc.png new file mode 100644 index 0000000..6a3b9f9 Binary files /dev/null and b/static/graphs/620981e8-49c8-486a-b30c-359702c8ffbc.png differ diff --git a/static/graphs/624d063d-cda8-4616-b4e4-54c04e427aec b/static/graphs/624d063d-cda8-4616-b4e4-54c04e427aec new file mode 100644 index 0000000..8eb7ab5 --- /dev/null +++ b/static/graphs/624d063d-cda8-4616-b4e4-54c04e427aec @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Netsh Helper DLL Mitigation - T1128" [label="mitre-enterprise-attack-course-of-action\nNetsh Helper DLL Mitigation - T1128",shape=ellipse];"mitre-enterprise-attack-course-of-action=Netsh Helper DLL Mitigation - T1128" -> "mitre-enterprise-attack-attack-pattern=Netsh Helper DLL - T1128" [label="mitigates",];} diff --git a/static/graphs/624d063d-cda8-4616-b4e4-54c04e427aec.png b/static/graphs/624d063d-cda8-4616-b4e4-54c04e427aec.png new file mode 100644 index 0000000..d935dfe Binary files /dev/null and b/static/graphs/624d063d-cda8-4616-b4e4-54c04e427aec.png differ diff --git a/static/graphs/629f6986-2c1f-4d0a-b805-e4ef3e2ce634 b/static/graphs/629f6986-2c1f-4d0a-b805-e4ef3e2ce634 new file mode 100644 index 0000000..afeaf07 --- /dev/null +++ b/static/graphs/629f6986-2c1f-4d0a-b805-e4ef3e2ce634 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryLocker" [label="ransomware\nCryLocker",shape=box,style=filled,color=deepskyblue];"ransomware=CryLocker" -> "ransomware=Central Security Treatment Organization" [label="similar",dir="both"];"ransomware=CryLocker" -> "malpedia=CryLocker" [label="similar",dir="both"];"ransomware=Central Security Treatment Organization" [label="ransomware\nCentral Security Treatment Organization",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/629f6986-2c1f-4d0a-b805-e4ef3e2ce634.png b/static/graphs/629f6986-2c1f-4d0a-b805-e4ef3e2ce634.png new file mode 100644 index 0000000..98c399a Binary files /dev/null and b/static/graphs/629f6986-2c1f-4d0a-b805-e4ef3e2ce634.png differ diff --git a/static/graphs/62a64fd3-aaf7-4d09-a375-d6f8bb118481 b/static/graphs/62a64fd3-aaf7-4d09-a375-d6f8bb118481 new file mode 100644 index 0000000..ccae608 --- /dev/null +++ b/static/graphs/62a64fd3-aaf7-4d09-a375-d6f8bb118481 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=TA459 - G0062" [label="mitre-enterprise-attack-intrusion-set\nTA459 - G0062",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=TA459 - G0062" -> "threat-actor=TA459" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=TA459 - G0062" -> "mitre-enterprise-attack-malware=PlugX - S0013" [label="uses",];"mitre-enterprise-attack-malware=PlugX - S0013" [label="mitre-enterprise-attack-malware\nPlugX - S0013",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PlugX - S0013" -> "rat=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "tool=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "malpedia=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "mitre-enterprise-attack-attack-pattern=Query Registry - T1012" [label="uses",];"threat-actor=TA459" [label="threat-actor\nTA459",shape=octagon,style=filled,color=indianred1];"rat=PlugX" [label="rat\nPlugX",shape=box,style=filled,color=deepskyblue];"tool=PlugX" [label="tool\nPlugX",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/62a64fd3-aaf7-4d09-a375-d6f8bb118481.png b/static/graphs/62a64fd3-aaf7-4d09-a375-d6f8bb118481.png new file mode 100644 index 0000000..fcfbcf3 Binary files /dev/null and b/static/graphs/62a64fd3-aaf7-4d09-a375-d6f8bb118481.png differ diff --git a/static/graphs/62ae52c9-7197-4f5b-be1d-10d2e1df2c96 b/static/graphs/62ae52c9-7197-4f5b-be1d-10d2e1df2c96 new file mode 100644 index 0000000..992faaf --- /dev/null +++ b/static/graphs/62ae52c9-7197-4f5b-be1d-10d2e1df2c96 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Domain Fronting Mitigation - T1172" [label="mitre-enterprise-attack-course-of-action\nDomain Fronting Mitigation - T1172",shape=ellipse];"mitre-enterprise-attack-course-of-action=Domain Fronting Mitigation - T1172" -> "mitre-enterprise-attack-attack-pattern=Domain Fronting - T1172" [label="mitigates",];} diff --git a/static/graphs/62ae52c9-7197-4f5b-be1d-10d2e1df2c96.png b/static/graphs/62ae52c9-7197-4f5b-be1d-10d2e1df2c96.png new file mode 100644 index 0000000..75751c8 Binary files /dev/null and b/static/graphs/62ae52c9-7197-4f5b-be1d-10d2e1df2c96.png differ diff --git a/static/graphs/63292b32-9867-4fb2-9e59-d4983d4fd5d1 b/static/graphs/63292b32-9867-4fb2-9e59-d4983d4fd5d1 new file mode 100644 index 0000000..1da98e8 --- /dev/null +++ b/static/graphs/63292b32-9867-4fb2-9e59-d4983d4fd5d1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=KeRanger" [label="ransomware\nKeRanger",shape=box,style=filled,color=deepskyblue];"ransomware=KeRanger" -> "malpedia=KeRanger" [label="similar",dir="both"];} diff --git a/static/graphs/63292b32-9867-4fb2-9e59-d4983d4fd5d1.png b/static/graphs/63292b32-9867-4fb2-9e59-d4983d4fd5d1.png new file mode 100644 index 0000000..91307bb Binary files /dev/null and b/static/graphs/63292b32-9867-4fb2-9e59-d4983d4fd5d1.png differ diff --git a/static/graphs/6374fc53-9a0d-41ba-b9cf-2a9765d69fbb b/static/graphs/6374fc53-9a0d-41ba-b9cf-2a9765d69fbb new file mode 100644 index 0000000..414af87 --- /dev/null +++ b/static/graphs/6374fc53-9a0d-41ba-b9cf-2a9765d69fbb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=EVILTOSS" [label="tool\nEVILTOSS",shape=box,style=filled,color=deepskyblue];"tool=EVILTOSS" -> "mitre-enterprise-attack-malware=ADVSTORESHELL - S0045" [label="similar",dir="both"];"tool=EVILTOSS" -> "malpedia=Sedreco" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ADVSTORESHELL - S0045" [label="mitre-enterprise-attack-malware\nADVSTORESHELL - S0045",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ADVSTORESHELL - S0045" -> "mitre-enterprise-attack-attack-pattern=Data Encrypted - T1022" [label="uses",];} diff --git a/static/graphs/6374fc53-9a0d-41ba-b9cf-2a9765d69fbb.png b/static/graphs/6374fc53-9a0d-41ba-b9cf-2a9765d69fbb.png new file mode 100644 index 0000000..00a23fa Binary files /dev/null and b/static/graphs/6374fc53-9a0d-41ba-b9cf-2a9765d69fbb.png differ diff --git a/static/graphs/63a82b7f-9a71-47a8-9a79-14acc6595da5 b/static/graphs/63a82b7f-9a71-47a8-9a79-14acc6595da5 new file mode 100644 index 0000000..391a236 --- /dev/null +++ b/static/graphs/63a82b7f-9a71-47a8-9a79-14acc6595da5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=VaultCrypt" [label="ransomware\nVaultCrypt",shape=box,style=filled,color=deepskyblue];"ransomware=VaultCrypt" -> "ransomware=Zlader" [label="similar",dir="both"];"ransomware=Zlader" [label="ransomware\nZlader",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/63a82b7f-9a71-47a8-9a79-14acc6595da5.png b/static/graphs/63a82b7f-9a71-47a8-9a79-14acc6595da5.png new file mode 100644 index 0000000..91599a2 Binary files /dev/null and b/static/graphs/63a82b7f-9a71-47a8-9a79-14acc6595da5.png differ diff --git a/static/graphs/63b3e6fb-9bb8-43dc-9cbf-7681b049b5d6 b/static/graphs/63b3e6fb-9bb8-43dc-9cbf-7681b049b5d6 new file mode 100644 index 0000000..b8e8192 --- /dev/null +++ b/static/graphs/63b3e6fb-9bb8-43dc-9cbf-7681b049b5d6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Casper" [label="tool\nCasper",shape=box,style=filled,color=deepskyblue];"tool=Casper" -> "malpedia=Casper" [label="similar",dir="both"];} diff --git a/static/graphs/63b3e6fb-9bb8-43dc-9cbf-7681b049b5d6.png b/static/graphs/63b3e6fb-9bb8-43dc-9cbf-7681b049b5d6.png new file mode 100644 index 0000000..e3df087 Binary files /dev/null and b/static/graphs/63b3e6fb-9bb8-43dc-9cbf-7681b049b5d6.png differ diff --git a/static/graphs/63c2a130-8a5b-452f-ad96-07cf0af12ffe b/static/graphs/63c2a130-8a5b-452f-ad96-07cf0af12ffe new file mode 100644 index 0000000..1eed01f --- /dev/null +++ b/static/graphs/63c2a130-8a5b-452f-ad96-07cf0af12ffe @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Dyre - S0024" [label="mitre-enterprise-attack-malware\nDyre - S0024",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Dyre - S0024" -> "banker=Dyre" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Dyre - S0024" -> "malpedia=Dyre" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Dyre - S0024" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="uses",];"banker=Dyre" [label="banker\nDyre",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/63c2a130-8a5b-452f-ad96-07cf0af12ffe.png b/static/graphs/63c2a130-8a5b-452f-ad96-07cf0af12ffe.png new file mode 100644 index 0000000..fd0672f Binary files /dev/null and b/static/graphs/63c2a130-8a5b-452f-ad96-07cf0af12ffe.png differ diff --git a/static/graphs/6447e3a1-ef4d-44b1-99d5-6b1c4888674f b/static/graphs/6447e3a1-ef4d-44b1-99d5-6b1c4888674f new file mode 100644 index 0000000..67765d3 --- /dev/null +++ b/static/graphs/6447e3a1-ef4d-44b1-99d5-6b1c4888674f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=HummingWhale - MOB-S0037" [label="mitre-mobile-attack-malware\nHummingWhale - MOB-S0037",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=HummingWhale - MOB-S0037" -> "mitre-mobile-attack-attack-pattern=Generate Fraudulent Advertising Revenue - MOB-T1075" [label="uses",];} diff --git a/static/graphs/6447e3a1-ef4d-44b1-99d5-6b1c4888674f.png b/static/graphs/6447e3a1-ef4d-44b1-99d5-6b1c4888674f.png new file mode 100644 index 0000000..28fe2c5 Binary files /dev/null and b/static/graphs/6447e3a1-ef4d-44b1-99d5-6b1c4888674f.png differ diff --git a/static/graphs/64764dc6-a032-495f-8250-1e4c06bdc163 b/static/graphs/64764dc6-a032-495f-8250-1e4c06bdc163 new file mode 100644 index 0000000..a3aab3b --- /dev/null +++ b/static/graphs/64764dc6-a032-495f-8250-1e4c06bdc163 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=BITSAdmin - S0190" [label="mitre-enterprise-attack-tool\nBITSAdmin - S0190",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=BITSAdmin - S0190" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/64764dc6-a032-495f-8250-1e4c06bdc163.png b/static/graphs/64764dc6-a032-495f-8250-1e4c06bdc163.png new file mode 100644 index 0000000..d2e1438 Binary files /dev/null and b/static/graphs/64764dc6-a032-495f-8250-1e4c06bdc163.png differ diff --git a/static/graphs/647894f6-1723-4cba-aba4-0ef0966d5302 b/static/graphs/647894f6-1723-4cba-aba4-0ef0966d5302 new file mode 100644 index 0000000..1a4108e --- /dev/null +++ b/static/graphs/647894f6-1723-4cba-aba4-0ef0966d5302 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=FIN6" [label="threat-actor\nFIN6",shape=octagon,style=filled,color=indianred1];"threat-actor=FIN6" -> "mitre-enterprise-attack-intrusion-set=FIN6 - G0037" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=FIN6 - G0037" [label="mitre-enterprise-attack-intrusion-set\nFIN6 - G0037",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=FIN6 - G0037" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];} diff --git a/static/graphs/647894f6-1723-4cba-aba4-0ef0966d5302.png b/static/graphs/647894f6-1723-4cba-aba4-0ef0966d5302.png new file mode 100644 index 0000000..e71c9b6 Binary files /dev/null and b/static/graphs/647894f6-1723-4cba-aba4-0ef0966d5302.png differ diff --git a/static/graphs/6489895b-0213-4564-9cfc-777df58d84c9 b/static/graphs/6489895b-0213-4564-9cfc-777df58d84c9 new file mode 100644 index 0000000..05a136f --- /dev/null +++ b/static/graphs/6489895b-0213-4564-9cfc-777df58d84c9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Herbst" [label="ransomware\nHerbst",shape=box,style=filled,color=deepskyblue];"ransomware=Herbst" -> "malpedia=Herbst" [label="similar",dir="both"];} diff --git a/static/graphs/6489895b-0213-4564-9cfc-777df58d84c9.png b/static/graphs/6489895b-0213-4564-9cfc-777df58d84c9.png new file mode 100644 index 0000000..235ded7 Binary files /dev/null and b/static/graphs/6489895b-0213-4564-9cfc-777df58d84c9.png differ diff --git a/static/graphs/649f7268-4c12-483b-ac84-4b7bca9fe2ee b/static/graphs/649f7268-4c12-483b-ac84-4b7bca9fe2ee new file mode 100644 index 0000000..c02b8cc --- /dev/null +++ b/static/graphs/649f7268-4c12-483b-ac84-4b7bca9fe2ee @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=Enterprise Policy - MOB-M1012" [label="mitre-mobile-attack-course-of-action\nEnterprise Policy - MOB-M1012",shape=ellipse];"mitre-mobile-attack-course-of-action=Enterprise Policy - MOB-M1012" -> "mitre-mobile-attack-attack-pattern=Abuse of iOS Enterprise App Signing Key - MOB-T1048" [label="mitigates",];"mitre-mobile-attack-course-of-action=Enterprise Policy - MOB-M1012" -> "mitre-mobile-attack-attack-pattern=Abuse Accessibility Features - MOB-T1056" [label="mitigates",];"mitre-mobile-attack-attack-pattern=Abuse of iOS Enterprise App Signing Key - MOB-T1048" [label="mitre-mobile-attack-attack-pattern\nAbuse of iOS Enterprise App Signing Key - MOB-T1048",shape=ellipse];} diff --git a/static/graphs/649f7268-4c12-483b-ac84-4b7bca9fe2ee.png b/static/graphs/649f7268-4c12-483b-ac84-4b7bca9fe2ee.png new file mode 100644 index 0000000..cb27417 Binary files /dev/null and b/static/graphs/649f7268-4c12-483b-ac84-4b7bca9fe2ee.png differ diff --git a/static/graphs/64d6559c-6d5c-4585-bbf9-c17868f763ee b/static/graphs/64d6559c-6d5c-4585-bbf9-c17868f763ee new file mode 100644 index 0000000..f38c922 --- /dev/null +++ b/static/graphs/64d6559c-6d5c-4585-bbf9-c17868f763ee @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Energetic Bear" [label="threat-actor\nEnergetic Bear",shape=octagon,style=filled,color=indianred1];"threat-actor=Energetic Bear" -> "mitre-enterprise-attack-intrusion-set=Dragonfly - G0035" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Dragonfly - G0035" [label="mitre-enterprise-attack-intrusion-set\nDragonfly - G0035",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Dragonfly - G0035" -> "mitre-enterprise-attack-malware=Trojan.Karagany - S0094" [label="uses",];"mitre-enterprise-attack-malware=Trojan.Karagany - S0094" [label="mitre-enterprise-attack-malware\nTrojan.Karagany - S0094",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Trojan.Karagany - S0094" -> "mitre-enterprise-attack-attack-pattern=Software Packing - T1045" [label="uses",];} diff --git a/static/graphs/64d6559c-6d5c-4585-bbf9-c17868f763ee.png b/static/graphs/64d6559c-6d5c-4585-bbf9-c17868f763ee.png new file mode 100644 index 0000000..bdc7c37 Binary files /dev/null and b/static/graphs/64d6559c-6d5c-4585-bbf9-c17868f763ee.png differ diff --git a/static/graphs/64d76fa5-cf8f-469c-b78c-1a4f7c5bad80 b/static/graphs/64d76fa5-cf8f-469c-b78c-1a4f7c5bad80 new file mode 100644 index 0000000..60aa0b9 --- /dev/null +++ b/static/graphs/64d76fa5-cf8f-469c-b78c-1a4f7c5bad80 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=BBSRAT - S0127" [label="mitre-enterprise-attack-malware\nBBSRAT - S0127",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BBSRAT - S0127" -> "malpedia=BBSRAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BBSRAT - S0127" -> "mitre-enterprise-attack-attack-pattern=System Service Discovery - T1007" [label="uses",];} diff --git a/static/graphs/64d76fa5-cf8f-469c-b78c-1a4f7c5bad80.png b/static/graphs/64d76fa5-cf8f-469c-b78c-1a4f7c5bad80.png new file mode 100644 index 0000000..bba2f5b Binary files /dev/null and b/static/graphs/64d76fa5-cf8f-469c-b78c-1a4f7c5bad80.png differ diff --git a/static/graphs/64fa0de0-6240-41f4-8638-f4ca7ed528fd b/static/graphs/64fa0de0-6240-41f4-8638-f4ca7ed528fd new file mode 100644 index 0000000..efc715b --- /dev/null +++ b/static/graphs/64fa0de0-6240-41f4-8638-f4ca7ed528fd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=PlugX - S0013" [label="mitre-enterprise-attack-malware\nPlugX - S0013",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PlugX - S0013" -> "rat=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "tool=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "malpedia=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "mitre-enterprise-attack-attack-pattern=Query Registry - T1012" [label="uses",];"rat=PlugX" [label="rat\nPlugX",shape=box,style=filled,color=deepskyblue];"tool=PlugX" [label="tool\nPlugX",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/64fa0de0-6240-41f4-8638-f4ca7ed528fd.png b/static/graphs/64fa0de0-6240-41f4-8638-f4ca7ed528fd.png new file mode 100644 index 0000000..479f40a Binary files /dev/null and b/static/graphs/64fa0de0-6240-41f4-8638-f4ca7ed528fd.png differ diff --git a/static/graphs/652b5242-b790-4695-ad0e-b79bbf78f351 b/static/graphs/652b5242-b790-4695-ad0e-b79bbf78f351 new file mode 100644 index 0000000..b355f24 --- /dev/null +++ b/static/graphs/652b5242-b790-4695-ad0e-b79bbf78f351 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Fareit" [label="tool\nFareit",shape=box,style=filled,color=deepskyblue];"tool=Fareit" -> "malpedia=Pony" [label="similar",dir="both"];"tool=Fareit" -> "tool=Hancitor" [label="similar",dir="both"];"tool=Hancitor" [label="tool\nHancitor",shape=box,style=filled,color=deepskyblue];"tool=Hancitor" -> "malpedia=Hancitor" [label="similar",dir="both"];} diff --git a/static/graphs/652b5242-b790-4695-ad0e-b79bbf78f351.png b/static/graphs/652b5242-b790-4695-ad0e-b79bbf78f351.png new file mode 100644 index 0000000..aae0fa8 Binary files /dev/null and b/static/graphs/652b5242-b790-4695-ad0e-b79bbf78f351.png differ diff --git a/static/graphs/65341f30-bec6-4b1d-8abf-1a5620446c29 b/static/graphs/65341f30-bec6-4b1d-8abf-1a5620446c29 new file mode 100644 index 0000000..5bbea66 --- /dev/null +++ b/static/graphs/65341f30-bec6-4b1d-8abf-1a5620446c29 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Reaver - S0172" [label="mitre-enterprise-attack-malware\nReaver - S0172",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Reaver - S0172" -> "malpedia=Reaver" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Reaver - S0172" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];} diff --git a/static/graphs/65341f30-bec6-4b1d-8abf-1a5620446c29.png b/static/graphs/65341f30-bec6-4b1d-8abf-1a5620446c29.png new file mode 100644 index 0000000..3d1ddd2 Binary files /dev/null and b/static/graphs/65341f30-bec6-4b1d-8abf-1a5620446c29.png differ diff --git a/static/graphs/653492e3-27be-4a0e-b08c-938dd2b7e0e1 b/static/graphs/653492e3-27be-4a0e-b08c-938dd2b7e0e1 new file mode 100644 index 0000000..bababdc --- /dev/null +++ b/static/graphs/653492e3-27be-4a0e-b08c-938dd2b7e0e1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=User Guidance - MOB-M1011" [label="mitre-mobile-attack-course-of-action\nUser Guidance - MOB-M1011",shape=ellipse];"mitre-mobile-attack-course-of-action=User Guidance - MOB-M1011" -> "mitre-mobile-attack-attack-pattern=Attack PC via USB Connection - MOB-T1030" [label="mitigates",];"mitre-mobile-attack-course-of-action=User Guidance - MOB-M1011" -> "mitre-mobile-attack-attack-pattern=Remotely Track Device Without Authorization - MOB-T1071" [label="mitigates",];} diff --git a/static/graphs/653492e3-27be-4a0e-b08c-938dd2b7e0e1.png b/static/graphs/653492e3-27be-4a0e-b08c-938dd2b7e0e1.png new file mode 100644 index 0000000..fa21ac9 Binary files /dev/null and b/static/graphs/653492e3-27be-4a0e-b08c-938dd2b7e0e1.png differ diff --git a/static/graphs/65370d0b-3bd4-4653-8cf9-daf56f6be830 b/static/graphs/65370d0b-3bd4-4653-8cf9-daf56f6be830 new file mode 100644 index 0000000..6bbb20e --- /dev/null +++ b/static/graphs/65370d0b-3bd4-4653-8cf9-daf56f6be830 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=meek - S0175" [label="mitre-enterprise-attack-tool\nmeek - S0175",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=meek - S0175" -> "mitre-enterprise-attack-attack-pattern=Domain Fronting - T1172" [label="uses",];} diff --git a/static/graphs/65370d0b-3bd4-4653-8cf9-daf56f6be830.png b/static/graphs/65370d0b-3bd4-4653-8cf9-daf56f6be830.png new file mode 100644 index 0000000..380099c Binary files /dev/null and b/static/graphs/65370d0b-3bd4-4653-8cf9-daf56f6be830.png differ diff --git a/static/graphs/656cd201-d57a-4a2f-a201-531eb4922a72 b/static/graphs/656cd201-d57a-4a2f-a201-531eb4922a72 new file mode 100644 index 0000000..011deb1 --- /dev/null +++ b/static/graphs/656cd201-d57a-4a2f-a201-531eb4922a72 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=HAPPYWORK" [label="tool\nHAPPYWORK",shape=box,style=filled,color=deepskyblue];"tool=HAPPYWORK" -> "mitre-enterprise-attack-malware=HAPPYWORK - S0214" [label="similar",dir="both"];"mitre-enterprise-attack-malware=HAPPYWORK - S0214" [label="mitre-enterprise-attack-malware\nHAPPYWORK - S0214",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=HAPPYWORK - S0214" -> "mitre-enterprise-attack-attack-pattern=System Information Discovery - T1082" [label="uses",];} diff --git a/static/graphs/656cd201-d57a-4a2f-a201-531eb4922a72.png b/static/graphs/656cd201-d57a-4a2f-a201-531eb4922a72.png new file mode 100644 index 0000000..9201054 Binary files /dev/null and b/static/graphs/656cd201-d57a-4a2f-a201-531eb4922a72.png differ diff --git a/static/graphs/65a30580-d542-4113-b00f-7fab98bd046c b/static/graphs/65a30580-d542-4113-b00f-7fab98bd046c new file mode 100644 index 0000000..0d83324 --- /dev/null +++ b/static/graphs/65a30580-d542-4113-b00f-7fab98bd046c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=BredoLab" [label="botnet\nBredoLab",shape=box,style=filled,color=deepskyblue];"botnet=BredoLab" -> "tool=Oficla" [label="similar",dir="both"];"tool=Oficla" [label="tool\nOficla",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/65a30580-d542-4113-b00f-7fab98bd046c.png b/static/graphs/65a30580-d542-4113-b00f-7fab98bd046c.png new file mode 100644 index 0000000..8e9bc88 Binary files /dev/null and b/static/graphs/65a30580-d542-4113-b00f-7fab98bd046c.png differ diff --git a/static/graphs/65da1eb6-d35d-4853-b280-98a76c0aef53 b/static/graphs/65da1eb6-d35d-4853-b280-98a76c0aef53 new file mode 100644 index 0000000..dfb5fb3 --- /dev/null +++ b/static/graphs/65da1eb6-d35d-4853-b280-98a76c0aef53 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Exploit Public-Facing Application Mitigation - T1190" [label="mitre-enterprise-attack-course-of-action\nExploit Public-Facing Application Mitigation - T1190",shape=ellipse];"mitre-enterprise-attack-course-of-action=Exploit Public-Facing Application Mitigation - T1190" -> "mitre-enterprise-attack-attack-pattern=Exploit Public-Facing Application - T1190" [label="mitigates",];} diff --git a/static/graphs/65da1eb6-d35d-4853-b280-98a76c0aef53.png b/static/graphs/65da1eb6-d35d-4853-b280-98a76c0aef53.png new file mode 100644 index 0000000..973ae8d Binary files /dev/null and b/static/graphs/65da1eb6-d35d-4853-b280-98a76c0aef53.png differ diff --git a/static/graphs/663f8ef9-4c50-499a-b765-f377d23c1070 b/static/graphs/663f8ef9-4c50-499a-b765-f377d23c1070 new file mode 100644 index 0000000..382c916 --- /dev/null +++ b/static/graphs/663f8ef9-4c50-499a-b765-f377d23c1070 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=PlugX" [label="rat\nPlugX",shape=box,style=filled,color=deepskyblue];"rat=PlugX" -> "mitre-enterprise-attack-malware=PlugX - S0013" [label="similar",dir="both"];"rat=PlugX" -> "tool=PlugX" [label="similar",dir="both"];"rat=PlugX" -> "malpedia=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" [label="mitre-enterprise-attack-malware\nPlugX - S0013",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PlugX - S0013" -> "mitre-enterprise-attack-attack-pattern=Query Registry - T1012" [label="uses",];"tool=PlugX" [label="tool\nPlugX",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/663f8ef9-4c50-499a-b765-f377d23c1070.png b/static/graphs/663f8ef9-4c50-499a-b765-f377d23c1070.png new file mode 100644 index 0000000..899cf4d Binary files /dev/null and b/static/graphs/663f8ef9-4c50-499a-b765-f377d23c1070.png differ diff --git a/static/graphs/664701d6-7948-4e80-a333-1d1938103ba1 b/static/graphs/664701d6-7948-4e80-a333-1d1938103ba1 new file mode 100644 index 0000000..32457fe --- /dev/null +++ b/static/graphs/664701d6-7948-4e80-a333-1d1938103ba1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=7ev3n" [label="ransomware\n7ev3n",shape=box,style=filled,color=deepskyblue];"ransomware=7ev3n" -> "malpedia=7ev3n" [label="similar",dir="both"];} diff --git a/static/graphs/664701d6-7948-4e80-a333-1d1938103ba1.png b/static/graphs/664701d6-7948-4e80-a333-1d1938103ba1.png new file mode 100644 index 0000000..b267f2a Binary files /dev/null and b/static/graphs/664701d6-7948-4e80-a333-1d1938103ba1.png differ diff --git a/static/graphs/66575fb4-7f92-42d8-8c47-e68a26413081 b/static/graphs/66575fb4-7f92-42d8-8c47-e68a26413081 new file mode 100644 index 0000000..cb29059 --- /dev/null +++ b/static/graphs/66575fb4-7f92-42d8-8c47-e68a26413081 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=T9000" [label="tool\nT9000",shape=box,style=filled,color=deepskyblue];"tool=T9000" -> "mitre-enterprise-attack-malware=T9000 - S0098" [label="similar",dir="both"];"mitre-enterprise-attack-malware=T9000 - S0098" [label="mitre-enterprise-attack-malware\nT9000 - S0098",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=T9000 - S0098" -> "mitre-enterprise-attack-attack-pattern=AppInit DLLs - T1103" [label="uses",];} diff --git a/static/graphs/66575fb4-7f92-42d8-8c47-e68a26413081.png b/static/graphs/66575fb4-7f92-42d8-8c47-e68a26413081.png new file mode 100644 index 0000000..8f90a08 Binary files /dev/null and b/static/graphs/66575fb4-7f92-42d8-8c47-e68a26413081.png differ diff --git a/static/graphs/6671bb0b-4fab-44a7-92f9-f641a887a0aa b/static/graphs/6671bb0b-4fab-44a7-92f9-f641a887a0aa new file mode 100644 index 0000000..c04d81b --- /dev/null +++ b/static/graphs/6671bb0b-4fab-44a7-92f9-f641a887a0aa @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=DoubleLocker" [label="android\nDoubleLocker",shape=box,style=filled,color=deepskyblue];"android=DoubleLocker" -> "malpedia=DoubleLocker" [label="similar",dir="both"];} diff --git a/static/graphs/6671bb0b-4fab-44a7-92f9-f641a887a0aa.png b/static/graphs/6671bb0b-4fab-44a7-92f9-f641a887a0aa.png new file mode 100644 index 0000000..0af190a Binary files /dev/null and b/static/graphs/6671bb0b-4fab-44a7-92f9-f641a887a0aa.png differ diff --git a/static/graphs/669a0e4d-9760-49fc-bdf5-0471f84e0c76 b/static/graphs/669a0e4d-9760-49fc-bdf5-0471f84e0c76 new file mode 100644 index 0000000..902f7e2 --- /dev/null +++ b/static/graphs/669a0e4d-9760-49fc-bdf5-0471f84e0c76 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=jSpy" [label="rat\njSpy",shape=box,style=filled,color=deepskyblue];"rat=jSpy" -> "malpedia=jSpy" [label="similar",dir="both"];} diff --git a/static/graphs/669a0e4d-9760-49fc-bdf5-0471f84e0c76.png b/static/graphs/669a0e4d-9760-49fc-bdf5-0471f84e0c76.png new file mode 100644 index 0000000..6479e03 Binary files /dev/null and b/static/graphs/669a0e4d-9760-49fc-bdf5-0471f84e0c76.png differ diff --git a/static/graphs/66b1dcde-17a0-4c7b-95fa-b08d430c2131 b/static/graphs/66b1dcde-17a0-4c7b-95fa-b08d430c2131 new file mode 100644 index 0000000..4dc60ed --- /dev/null +++ b/static/graphs/66b1dcde-17a0-4c7b-95fa-b08d430c2131 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=S-Type - S0085" [label="mitre-enterprise-attack-malware\nS-Type - S0085",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=S-Type - S0085" -> "mitre-enterprise-attack-attack-pattern=Shortcut Modification - T1023" [label="uses",];} diff --git a/static/graphs/66b1dcde-17a0-4c7b-95fa-b08d430c2131.png b/static/graphs/66b1dcde-17a0-4c7b-95fa-b08d430c2131.png new file mode 100644 index 0000000..a3b3572 Binary files /dev/null and b/static/graphs/66b1dcde-17a0-4c7b-95fa-b08d430c2131.png differ diff --git a/static/graphs/6713ab67-e25b-49cc-808d-2b36d4fbc35c b/static/graphs/6713ab67-e25b-49cc-808d-2b36d4fbc35c new file mode 100644 index 0000000..56e816f --- /dev/null +++ b/static/graphs/6713ab67-e25b-49cc-808d-2b36d4fbc35c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Ke3chang - G0004" [label="mitre-enterprise-attack-intrusion-set\nKe3chang - G0004",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Ke3chang - G0004" -> "mitre-enterprise-attack-attack-pattern=Account Discovery - T1087" [label="uses",];} diff --git a/static/graphs/6713ab67-e25b-49cc-808d-2b36d4fbc35c.png b/static/graphs/6713ab67-e25b-49cc-808d-2b36d4fbc35c.png new file mode 100644 index 0000000..593e9a1 Binary files /dev/null and b/static/graphs/6713ab67-e25b-49cc-808d-2b36d4fbc35c.png differ diff --git a/static/graphs/6720f960-0382-479b-a0f8-f9e008995af4 b/static/graphs/6720f960-0382-479b-a0f8-f9e008995af4 new file mode 100644 index 0000000..02897e1 --- /dev/null +++ b/static/graphs/6720f960-0382-479b-a0f8-f9e008995af4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Ranbyus" [label="banker\nRanbyus",shape=box,style=filled,color=deepskyblue];"banker=Ranbyus" -> "malpedia=Ranbyus" [label="similar",dir="both"];} diff --git a/static/graphs/6720f960-0382-479b-a0f8-f9e008995af4.png b/static/graphs/6720f960-0382-479b-a0f8-f9e008995af4.png new file mode 100644 index 0000000..8e797b6 Binary files /dev/null and b/static/graphs/6720f960-0382-479b-a0f8-f9e008995af4.png differ diff --git a/static/graphs/673d05fa-4066-442c-bdb6-0c0a2da5ae62 b/static/graphs/673d05fa-4066-442c-bdb6-0c0a2da5ae62 new file mode 100644 index 0000000..5589245 --- /dev/null +++ b/static/graphs/673d05fa-4066-442c-bdb6-0c0a2da5ae62 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Joao" [label="tool\nJoao",shape=box,style=filled,color=deepskyblue];"tool=Joao" -> "malpedia=Joao" [label="similar",dir="both"];} diff --git a/static/graphs/673d05fa-4066-442c-bdb6-0c0a2da5ae62.png b/static/graphs/673d05fa-4066-442c-bdb6-0c0a2da5ae62.png new file mode 100644 index 0000000..426eafa Binary files /dev/null and b/static/graphs/673d05fa-4066-442c-bdb6-0c0a2da5ae62.png differ diff --git a/static/graphs/674c3bf6-2e16-427d-ab0f-b91676a460cd b/static/graphs/674c3bf6-2e16-427d-ab0f-b91676a460cd new file mode 100644 index 0000000..d0e6c87 --- /dev/null +++ b/static/graphs/674c3bf6-2e16-427d-ab0f-b91676a460cd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Radamant" [label="ransomware\nRadamant",shape=box,style=filled,color=deepskyblue];"ransomware=Radamant" -> "malpedia=Radamant" [label="similar",dir="both"];} diff --git a/static/graphs/674c3bf6-2e16-427d-ab0f-b91676a460cd.png b/static/graphs/674c3bf6-2e16-427d-ab0f-b91676a460cd.png new file mode 100644 index 0000000..4687b3f Binary files /dev/null and b/static/graphs/674c3bf6-2e16-427d-ab0f-b91676a460cd.png differ diff --git a/static/graphs/67a1a317-9f79-42bd-a4b2-fa1867d37d27 b/static/graphs/67a1a317-9f79-42bd-a4b2-fa1867d37d27 new file mode 100644 index 0000000..a97fb3b --- /dev/null +++ b/static/graphs/67a1a317-9f79-42bd-a4b2-fa1867d37d27 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Bebloh" [label="banker\nBebloh",shape=box,style=filled,color=deepskyblue];"banker=Bebloh" -> "malpedia=UrlZone" [label="similar",dir="both"];} diff --git a/static/graphs/67a1a317-9f79-42bd-a4b2-fa1867d37d27.png b/static/graphs/67a1a317-9f79-42bd-a4b2-fa1867d37d27.png new file mode 100644 index 0000000..3eb8203 Binary files /dev/null and b/static/graphs/67a1a317-9f79-42bd-a4b2-fa1867d37d27.png differ diff --git a/static/graphs/67ade442-63f2-4319-bdcd-d2564b963ed6 b/static/graphs/67ade442-63f2-4319-bdcd-d2564b963ed6 new file mode 100644 index 0000000..c1a483d --- /dev/null +++ b/static/graphs/67ade442-63f2-4319-bdcd-d2564b963ed6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Prikormka" [label="tool\nPrikormka",shape=box,style=filled,color=deepskyblue];"tool=Prikormka" -> "mitre-enterprise-attack-malware=Prikormka - S0113" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Prikormka - S0113" [label="mitre-enterprise-attack-malware\nPrikormka - S0113",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Prikormka - S0113" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];} diff --git a/static/graphs/67ade442-63f2-4319-bdcd-d2564b963ed6.png b/static/graphs/67ade442-63f2-4319-bdcd-d2564b963ed6.png new file mode 100644 index 0000000..8d75b44 Binary files /dev/null and b/static/graphs/67ade442-63f2-4319-bdcd-d2564b963ed6.png differ diff --git a/static/graphs/67d712c8-d254-4820-83fa-9a892b87923b b/static/graphs/67d712c8-d254-4820-83fa-9a892b87923b new file mode 100644 index 0000000..685d5c9 --- /dev/null +++ b/static/graphs/67d712c8-d254-4820-83fa-9a892b87923b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Shifu" [label="tool\nShifu",shape=box,style=filled,color=deepskyblue];"tool=Shifu" -> "malpedia=Shifu" [label="similar",dir="both"];"tool=Shifu" -> "tool=Shiz" [label="similar",dir="both"];"tool=Shiz" [label="tool\nShiz",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/67d712c8-d254-4820-83fa-9a892b87923b.png b/static/graphs/67d712c8-d254-4820-83fa-9a892b87923b.png new file mode 100644 index 0000000..dd7acba Binary files /dev/null and b/static/graphs/67d712c8-d254-4820-83fa-9a892b87923b.png differ diff --git a/static/graphs/67e6d66b-1b82-4699-b47a-e2efb6268d14 b/static/graphs/67e6d66b-1b82-4699-b47a-e2efb6268d14 new file mode 100644 index 0000000..db6c72a --- /dev/null +++ b/static/graphs/67e6d66b-1b82-4699-b47a-e2efb6268d14 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=SeaDuke - S0053" [label="mitre-enterprise-attack-malware\nSeaDuke - S0053",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SeaDuke - S0053" -> "malpedia=SEADADDY" [label="similar",dir="both"];"mitre-enterprise-attack-malware=SeaDuke - S0053" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/67e6d66b-1b82-4699-b47a-e2efb6268d14.png b/static/graphs/67e6d66b-1b82-4699-b47a-e2efb6268d14.png new file mode 100644 index 0000000..521d5ff Binary files /dev/null and b/static/graphs/67e6d66b-1b82-4699-b47a-e2efb6268d14.png differ diff --git a/static/graphs/67fc172a-36fa-4a35-88eb-4ba730ed52a6 b/static/graphs/67fc172a-36fa-4a35-88eb-4ba730ed52a6 new file mode 100644 index 0000000..9b26067 --- /dev/null +++ b/static/graphs/67fc172a-36fa-4a35-88eb-4ba730ed52a6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=BS2005 - S0014" [label="mitre-enterprise-attack-malware\nBS2005 - S0014",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BS2005 - S0014" -> "tool=Hoardy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BS2005 - S0014" -> "malpedia=BS2005" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BS2005 - S0014" -> "mitre-enterprise-attack-attack-pattern=Data Encoding - T1132" [label="uses",];"tool=Hoardy" [label="tool\nHoardy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/67fc172a-36fa-4a35-88eb-4ba730ed52a6.png b/static/graphs/67fc172a-36fa-4a35-88eb-4ba730ed52a6.png new file mode 100644 index 0000000..8da5ed9 Binary files /dev/null and b/static/graphs/67fc172a-36fa-4a35-88eb-4ba730ed52a6.png differ diff --git a/static/graphs/681f212a-af1b-4e40-a718-81b0dc46dc52 b/static/graphs/681f212a-af1b-4e40-a718-81b0dc46dc52 new file mode 100644 index 0000000..e32c289 --- /dev/null +++ b/static/graphs/681f212a-af1b-4e40-a718-81b0dc46dc52 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Mobef" [label="ransomware\nMobef",shape=box,style=filled,color=deepskyblue];"ransomware=Mobef" -> "ransomware=CryptoBit" [label="similar",dir="both"];"ransomware=Mobef" -> "ransomware=Mobef-JustFun" [label="similar",dir="both"];"ransomware=CryptoBit" [label="ransomware\nCryptoBit",shape=box,style=filled,color=deepskyblue];"ransomware=Mobef-JustFun" [label="ransomware\nMobef-JustFun",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/681f212a-af1b-4e40-a718-81b0dc46dc52.png b/static/graphs/681f212a-af1b-4e40-a718-81b0dc46dc52.png new file mode 100644 index 0000000..a0dc1ff Binary files /dev/null and b/static/graphs/681f212a-af1b-4e40-a718-81b0dc46dc52.png differ diff --git a/static/graphs/68391641-859f-4a9a-9a1e-3e5cf71ec376 b/static/graphs/68391641-859f-4a9a-9a1e-3e5cf71ec376 new file mode 100644 index 0000000..06249fe --- /dev/null +++ b/static/graphs/68391641-859f-4a9a-9a1e-3e5cf71ec376 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Lazarus Group" [label="threat-actor\nLazarus Group",shape=octagon,style=filled,color=indianred1];"threat-actor=Lazarus Group" -> "mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" [label="similar",dir="both"];"threat-actor=Lazarus Group" -> "threat-actor=Operation Sharpshooter" [label="similar",dir="both"];"threat-actor=Lazarus Group" -> "threat-actor=APT37" [label="linked-to",];"mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" [label="mitre-enterprise-attack-intrusion-set\nLazarus Group - G0032",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" -> "mitre-enterprise-attack-attack-pattern=Windows Admin Shares - T1077" [label="uses",];"threat-actor=APT37" [label="threat-actor\nAPT37",shape=octagon,style=filled,color=indianred1];"threat-actor=APT37" -> "mitre-enterprise-attack-intrusion-set=APT37 - G0067" [label="similar",dir="both"];"threat-actor=APT37" -> "threat-actor=Lazarus Group" [label="linked-to",];"threat-actor=Operation Sharpshooter" [label="threat-actor\nOperation Sharpshooter",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT37 - G0067" [label="mitre-enterprise-attack-intrusion-set\nAPT37 - G0067",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT37 - G0067" -> "mitre-enterprise-attack-attack-pattern=Custom Command and Control Protocol - T1094" [label="uses",];} diff --git a/static/graphs/68391641-859f-4a9a-9a1e-3e5cf71ec376.png b/static/graphs/68391641-859f-4a9a-9a1e-3e5cf71ec376.png new file mode 100644 index 0000000..e60ed28 Binary files /dev/null and b/static/graphs/68391641-859f-4a9a-9a1e-3e5cf71ec376.png differ diff --git a/static/graphs/684feec3-f9ba-4049-9d8f-52d52f3e0e40 b/static/graphs/684feec3-f9ba-4049-9d8f-52d52f3e0e40 new file mode 100644 index 0000000..4d12abd --- /dev/null +++ b/static/graphs/684feec3-f9ba-4049-9d8f-52d52f3e0e40 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=System Network Configuration Discovery Mitigation - T1016" [label="mitre-enterprise-attack-course-of-action\nSystem Network Configuration Discovery Mitigation - T1016",shape=ellipse];"mitre-enterprise-attack-course-of-action=System Network Configuration Discovery Mitigation - T1016" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="mitigates",];} diff --git a/static/graphs/684feec3-f9ba-4049-9d8f-52d52f3e0e40.png b/static/graphs/684feec3-f9ba-4049-9d8f-52d52f3e0e40.png new file mode 100644 index 0000000..523f6cc Binary files /dev/null and b/static/graphs/684feec3-f9ba-4049-9d8f-52d52f3e0e40.png differ diff --git a/static/graphs/687c23e4-4e25-4ee7-a870-c5e002511f54 b/static/graphs/687c23e4-4e25-4ee7-a870-c5e002511f54 new file mode 100644 index 0000000..2197271 --- /dev/null +++ b/static/graphs/687c23e4-4e25-4ee7-a870-c5e002511f54 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=DustySky - S0062" [label="mitre-enterprise-attack-malware\nDustySky - S0062",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DustySky - S0062" -> "tool=NeD Worm" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DustySky - S0062" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];"tool=NeD Worm" [label="tool\nNeD Worm",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/687c23e4-4e25-4ee7-a870-c5e002511f54.png b/static/graphs/687c23e4-4e25-4ee7-a870-c5e002511f54.png new file mode 100644 index 0000000..03a92b3 Binary files /dev/null and b/static/graphs/687c23e4-4e25-4ee7-a870-c5e002511f54.png differ diff --git a/static/graphs/68ba94ab-78b8-43e7-83e2-aed3466882c6 b/static/graphs/68ba94ab-78b8-43e7-83e2-aed3466882c6 new file mode 100644 index 0000000..eb0893c --- /dev/null +++ b/static/graphs/68ba94ab-78b8-43e7-83e2-aed3466882c6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];} diff --git a/static/graphs/68ba94ab-78b8-43e7-83e2-aed3466882c6.png b/static/graphs/68ba94ab-78b8-43e7-83e2-aed3466882c6.png new file mode 100644 index 0000000..98729b9 Binary files /dev/null and b/static/graphs/68ba94ab-78b8-43e7-83e2-aed3466882c6.png differ diff --git a/static/graphs/68dca94f-c11d-421e-9287-7c501108e18c b/static/graphs/68dca94f-c11d-421e-9287-7c501108e18c new file mode 100644 index 0000000..de85c1b --- /dev/null +++ b/static/graphs/68dca94f-c11d-421e-9287-7c501108e18c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Duqu - S0038" [label="mitre-enterprise-attack-malware\nDuqu - S0038",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Duqu - S0038" -> "tool=Duqu" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Duqu - S0038" -> "mitre-enterprise-attack-attack-pattern=Process Hollowing - T1093" [label="uses",];"tool=Duqu" [label="tool\nDuqu",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/68dca94f-c11d-421e-9287-7c501108e18c.png b/static/graphs/68dca94f-c11d-421e-9287-7c501108e18c.png new file mode 100644 index 0000000..3692dbc Binary files /dev/null and b/static/graphs/68dca94f-c11d-421e-9287-7c501108e18c.png differ diff --git a/static/graphs/691c60e2-273d-4d56-9ce6-b67e0f8719ad b/static/graphs/691c60e2-273d-4d56-9ce6-b67e0f8719ad new file mode 100644 index 0000000..1687670 --- /dev/null +++ b/static/graphs/691c60e2-273d-4d56-9ce6-b67e0f8719ad @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Truvasys - S0178" [label="mitre-enterprise-attack-malware\nTruvasys - S0178",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Truvasys - S0178" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];} diff --git a/static/graphs/691c60e2-273d-4d56-9ce6-b67e0f8719ad.png b/static/graphs/691c60e2-273d-4d56-9ce6-b67e0f8719ad.png new file mode 100644 index 0000000..9d22ee4 Binary files /dev/null and b/static/graphs/691c60e2-273d-4d56-9ce6-b67e0f8719ad.png differ diff --git a/static/graphs/69d6f4a9-fcf0-4f51-bca7-597c51ad0bb8 b/static/graphs/69d6f4a9-fcf0-4f51-bca7-597c51ad0bb8 new file mode 100644 index 0000000..db33d5c --- /dev/null +++ b/static/graphs/69d6f4a9-fcf0-4f51-bca7-597c51ad0bb8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Remsec - S0125" [label="mitre-enterprise-attack-malware\nRemsec - S0125",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Remsec - S0125" -> "malpedia=Remsec" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Remsec - S0125" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Alternative Protocol - T1048" [label="uses",];} diff --git a/static/graphs/69d6f4a9-fcf0-4f51-bca7-597c51ad0bb8.png b/static/graphs/69d6f4a9-fcf0-4f51-bca7-597c51ad0bb8.png new file mode 100644 index 0000000..1f17d23 Binary files /dev/null and b/static/graphs/69d6f4a9-fcf0-4f51-bca7-597c51ad0bb8.png differ diff --git a/static/graphs/6a0ef5d4-fc7c-4dda-85d7-592e4dbdc5d9 b/static/graphs/6a0ef5d4-fc7c-4dda-85d7-592e4dbdc5d9 new file mode 100644 index 0000000..af9c716 --- /dev/null +++ b/static/graphs/6a0ef5d4-fc7c-4dda-85d7-592e4dbdc5d9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Sykipot - S0018" [label="mitre-enterprise-attack-malware\nSykipot - S0018",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Sykipot - S0018" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];} diff --git a/static/graphs/6a0ef5d4-fc7c-4dda-85d7-592e4dbdc5d9.png b/static/graphs/6a0ef5d4-fc7c-4dda-85d7-592e4dbdc5d9.png new file mode 100644 index 0000000..8d4650f Binary files /dev/null and b/static/graphs/6a0ef5d4-fc7c-4dda-85d7-592e4dbdc5d9.png differ diff --git a/static/graphs/6a28a648-30c0-4d1d-bd67-81a8dc6486ba b/static/graphs/6a28a648-30c0-4d1d-bd67-81a8dc6486ba new file mode 100644 index 0000000..5097b1e --- /dev/null +++ b/static/graphs/6a28a648-30c0-4d1d-bd67-81a8dc6486ba @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=GeminiDuke" [label="tool\nGeminiDuke",shape=box,style=filled,color=deepskyblue];"tool=GeminiDuke" -> "mitre-enterprise-attack-malware=GeminiDuke - S0049" [label="similar",dir="both"];"mitre-enterprise-attack-malware=GeminiDuke - S0049" [label="mitre-enterprise-attack-malware\nGeminiDuke - S0049",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=GeminiDuke - S0049" -> "mitre-enterprise-attack-attack-pattern=Account Discovery - T1087" [label="uses",];} diff --git a/static/graphs/6a28a648-30c0-4d1d-bd67-81a8dc6486ba.png b/static/graphs/6a28a648-30c0-4d1d-bd67-81a8dc6486ba.png new file mode 100644 index 0000000..7323cd2 Binary files /dev/null and b/static/graphs/6a28a648-30c0-4d1d-bd67-81a8dc6486ba.png differ diff --git a/static/graphs/6a2e693f-24e5-451a-9f88-b36a108e5662 b/static/graphs/6a2e693f-24e5-451a-9f88-b36a108e5662 new file mode 100644 index 0000000..44c0f25 --- /dev/null +++ b/static/graphs/6a2e693f-24e5-451a-9f88-b36a108e5662 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=APT1 - G0006" [label="mitre-enterprise-attack-intrusion-set\nAPT1 - G0006",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT1 - G0006" -> "threat-actor=Comment Crew" [label="similar",dir="both"];"mitre-pre-attack-intrusion-set=APT1 - G0006" [label="mitre-pre-attack-intrusion-set\nAPT1 - G0006",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT1 - G0006" -> "mitre-enterprise-attack-attack-pattern=Email Collection - T1114" [label="uses",];"mitre-pre-attack-intrusion-set=APT1 - G0006" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];"mitre-pre-attack-intrusion-set=APT1 - G0006" -> "mitre-enterprise-attack-attack-pattern=Account Discovery - T1087" [label="uses",];"threat-actor=Comment Crew" [label="threat-actor\nComment Crew",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/6a2e693f-24e5-451a-9f88-b36a108e5662.png b/static/graphs/6a2e693f-24e5-451a-9f88-b36a108e5662.png new file mode 100644 index 0000000..1b443d2 Binary files /dev/null and b/static/graphs/6a2e693f-24e5-451a-9f88-b36a108e5662.png differ diff --git a/static/graphs/6a42aa10-5b7e-43b0-8c58-414cdaeda453 b/static/graphs/6a42aa10-5b7e-43b0-8c58-414cdaeda453 new file mode 100644 index 0000000..9d751a1 --- /dev/null +++ b/static/graphs/6a42aa10-5b7e-43b0-8c58-414cdaeda453 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=SNUGRIDE" [label="tool\nSNUGRIDE",shape=box,style=filled,color=deepskyblue];"tool=SNUGRIDE" -> "mitre-enterprise-attack-malware=SNUGRIDE - S0159" [label="similar",dir="both"];"mitre-enterprise-attack-malware=SNUGRIDE - S0159" [label="mitre-enterprise-attack-malware\nSNUGRIDE - S0159",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SNUGRIDE - S0159" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/6a42aa10-5b7e-43b0-8c58-414cdaeda453.png b/static/graphs/6a42aa10-5b7e-43b0-8c58-414cdaeda453.png new file mode 100644 index 0000000..cac8635 Binary files /dev/null and b/static/graphs/6a42aa10-5b7e-43b0-8c58-414cdaeda453.png differ diff --git a/static/graphs/6a6525b9-4656-4973-ab45-588592395d0c b/static/graphs/6a6525b9-4656-4973-ab45-588592395d0c new file mode 100644 index 0000000..84c95c8 --- /dev/null +++ b/static/graphs/6a6525b9-4656-4973-ab45-588592395d0c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=FruitFly" [label="tool\nFruitFly",shape=box,style=filled,color=deepskyblue];"tool=FruitFly" -> "malpedia=FruitFly" [label="similar",dir="both"];} diff --git a/static/graphs/6a6525b9-4656-4973-ab45-588592395d0c.png b/static/graphs/6a6525b9-4656-4973-ab45-588592395d0c.png new file mode 100644 index 0000000..a41d77e Binary files /dev/null and b/static/graphs/6a6525b9-4656-4973-ab45-588592395d0c.png differ diff --git a/static/graphs/6a8ed1dd-34f1-42a3-9d9a-f81d91f53f7c b/static/graphs/6a8ed1dd-34f1-42a3-9d9a-f81d91f53f7c new file mode 100644 index 0000000..4d8592d --- /dev/null +++ b/static/graphs/6a8ed1dd-34f1-42a3-9d9a-f81d91f53f7c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Revenge" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/6a8ed1dd-34f1-42a3-9d9a-f81d91f53f7c.png b/static/graphs/6a8ed1dd-34f1-42a3-9d9a-f81d91f53f7c.png new file mode 100644 index 0000000..95b5461 Binary files /dev/null and b/static/graphs/6a8ed1dd-34f1-42a3-9d9a-f81d91f53f7c.png differ diff --git a/static/graphs/6ac125c8-6f00-490f-a43b-30b36d715431 b/static/graphs/6ac125c8-6f00-490f-a43b-30b36d715431 new file mode 100644 index 0000000..1892d8c --- /dev/null +++ b/static/graphs/6ac125c8-6f00-490f-a43b-30b36d715431 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=FINSPY" [label="rat\nFINSPY",shape=box,style=filled,color=deepskyblue];"rat=FINSPY" -> "tool=FINSPY" [label="similar",dir="both"];"tool=FINSPY" [label="tool\nFINSPY",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/6ac125c8-6f00-490f-a43b-30b36d715431.png b/static/graphs/6ac125c8-6f00-490f-a43b-30b36d715431.png new file mode 100644 index 0000000..011d20b Binary files /dev/null and b/static/graphs/6ac125c8-6f00-490f-a43b-30b36d715431.png differ diff --git a/static/graphs/6b616fc1-1505-48e3-8b2c-0d19337bff38 b/static/graphs/6b616fc1-1505-48e3-8b2c-0d19337bff38 new file mode 100644 index 0000000..32831cf --- /dev/null +++ b/static/graphs/6b616fc1-1505-48e3-8b2c-0d19337bff38 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Rover - S0090" [label="mitre-enterprise-attack-malware\nRover - S0090",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Rover - S0090" -> "malpedia=Rover" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Rover - S0090" -> "mitre-enterprise-attack-attack-pattern=Automated Collection - T1119" [label="uses",];} diff --git a/static/graphs/6b616fc1-1505-48e3-8b2c-0d19337bff38.png b/static/graphs/6b616fc1-1505-48e3-8b2c-0d19337bff38.png new file mode 100644 index 0000000..d896612 Binary files /dev/null and b/static/graphs/6b616fc1-1505-48e3-8b2c-0d19337bff38.png differ diff --git a/static/graphs/6b62e336-176f-417b-856a-8552dd8c44e1 b/static/graphs/6b62e336-176f-417b-856a-8552dd8c44e1 new file mode 100644 index 0000000..d4c18eb --- /dev/null +++ b/static/graphs/6b62e336-176f-417b-856a-8552dd8c44e1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Epic - S0091" [label="mitre-enterprise-attack-malware\nEpic - S0091",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Epic - S0091" -> "tool=Wipbot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Epic - S0091" -> "malpedia=Wipbot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Epic - S0091" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=Wipbot" [label="tool\nWipbot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/6b62e336-176f-417b-856a-8552dd8c44e1.png b/static/graphs/6b62e336-176f-417b-856a-8552dd8c44e1.png new file mode 100644 index 0000000..9940d38 Binary files /dev/null and b/static/graphs/6b62e336-176f-417b-856a-8552dd8c44e1.png differ diff --git a/static/graphs/6b846ad0-cc20-4db6-aa34-91561397c5e2 b/static/graphs/6b846ad0-cc20-4db6-aa34-91561397c5e2 new file mode 100644 index 0000000..83e5092 --- /dev/null +++ b/static/graphs/6b846ad0-cc20-4db6-aa34-91561397c5e2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=App Delivered via Web Download - MOB-T1034" [label="mitre-mobile-attack-attack-pattern\nApp Delivered via Web Download - MOB-T1034",shape=ellipse];} diff --git a/static/graphs/6b846ad0-cc20-4db6-aa34-91561397c5e2.png b/static/graphs/6b846ad0-cc20-4db6-aa34-91561397c5e2.png new file mode 100644 index 0000000..cf39e63 Binary files /dev/null and b/static/graphs/6b846ad0-cc20-4db6-aa34-91561397c5e2.png differ diff --git a/static/graphs/6baa1f46-daa9-4f40-952b-ec613c835abb b/static/graphs/6baa1f46-daa9-4f40-952b-ec613c835abb new file mode 100644 index 0000000..8caf01b --- /dev/null +++ b/static/graphs/6baa1f46-daa9-4f40-952b-ec613c835abb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=P.A.S. webshell" [label="tool\nP.A.S. webshell",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/6baa1f46-daa9-4f40-952b-ec613c835abb.png b/static/graphs/6baa1f46-daa9-4f40-952b-ec613c835abb.png new file mode 100644 index 0000000..eba4123 Binary files /dev/null and b/static/graphs/6baa1f46-daa9-4f40-952b-ec613c835abb.png differ diff --git a/static/graphs/6bd7c91a-fdf5-11e8-95a8-e712ad4b0a9d b/static/graphs/6bd7c91a-fdf5-11e8-95a8-e712ad4b0a9d new file mode 100644 index 0000000..bc17a19 --- /dev/null +++ b/static/graphs/6bd7c91a-fdf5-11e8-95a8-e712ad4b0a9d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=GC01" [label="threat-actor\nGC01",shape=octagon,style=filled,color=indianred1];"threat-actor=GC01" -> "threat-actor=GC02" [label="similar",dir="both"];"threat-actor=GC02" [label="threat-actor\nGC02",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/6bd7c91a-fdf5-11e8-95a8-e712ad4b0a9d.png b/static/graphs/6bd7c91a-fdf5-11e8-95a8-e712ad4b0a9d.png new file mode 100644 index 0000000..bc9c1c3 Binary files /dev/null and b/static/graphs/6bd7c91a-fdf5-11e8-95a8-e712ad4b0a9d.png differ diff --git a/static/graphs/6c3c111a-93af-428a-bee0-feacbee0237d b/static/graphs/6c3c111a-93af-428a-bee0-feacbee0237d new file mode 100644 index 0000000..8d89a9f --- /dev/null +++ b/static/graphs/6c3c111a-93af-428a-bee0-feacbee0237d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=NanoCore" [label="rat\nNanoCore",shape=box,style=filled,color=deepskyblue];"rat=NanoCore" -> "tool=NanoCoreRAT" [label="similar",dir="both"];"tool=NanoCoreRAT" [label="tool\nNanoCoreRAT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/6c3c111a-93af-428a-bee0-feacbee0237d.png b/static/graphs/6c3c111a-93af-428a-bee0-feacbee0237d.png new file mode 100644 index 0000000..ce3cdca Binary files /dev/null and b/static/graphs/6c3c111a-93af-428a-bee0-feacbee0237d.png differ diff --git a/static/graphs/6c562458-7970-4d61-aded-1fe4a9002404 b/static/graphs/6c562458-7970-4d61-aded-1fe4a9002404 new file mode 100644 index 0000000..8dfb804 --- /dev/null +++ b/static/graphs/6c562458-7970-4d61-aded-1fe4a9002404 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Raindrop" [label="tool\nRaindrop",shape=box,style=filled,color=deepskyblue];"tool=Raindrop" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=Raindrop" -> "tool=TEARDROP" [label="variant-of",];"microsoft-activity-group=NOBELIUM" [label="microsoft-activity-group\nNOBELIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=NOBELIUM" -> "threat-actor=UNC2452" [label="similar",dir="both"];"microsoft-activity-group=NOBELIUM" -> "backdoor=SUNBURST" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=TEARDROP" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=GoldMax" [label="uses",];"tool=TEARDROP" [label="tool\nTEARDROP",shape=box,style=filled,color=deepskyblue];"tool=TEARDROP" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=TEARDROP" -> "tool=Raindrop" [label="variant-of",];"backdoor=SUNBURST" [label="backdoor\nSUNBURST",shape=box,style=filled,color=deepskyblue];"backdoor=SUNBURST" -> "tool=SUNSPOT" [label="dropped-by",];"backdoor=SUNBURST" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"threat-actor=UNC2452" [label="threat-actor\nUNC2452",shape=octagon,style=filled,color=indianred1];"tool=GoldMax" [label="tool\nGoldMax",shape=box,style=filled,color=deepskyblue];"tool=GoldMax" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=SUNSPOT" [label="tool\nSUNSPOT",shape=box,style=filled,color=deepskyblue];"tool=SUNSPOT" -> "backdoor=SUNBURST" [label="dropped",];} diff --git a/static/graphs/6c562458-7970-4d61-aded-1fe4a9002404.png b/static/graphs/6c562458-7970-4d61-aded-1fe4a9002404.png new file mode 100644 index 0000000..a2f81cf Binary files /dev/null and b/static/graphs/6c562458-7970-4d61-aded-1fe4a9002404.png differ diff --git a/static/graphs/6cac62ce-550b-4793-8ee6-6a1b8836edb0 b/static/graphs/6cac62ce-550b-4793-8ee6-6a1b8836edb0 new file mode 100644 index 0000000..0d37039 --- /dev/null +++ b/static/graphs/6cac62ce-550b-4793-8ee6-6a1b8836edb0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Indicator Removal on Host Mitigation - T1070" [label="mitre-enterprise-attack-course-of-action\nIndicator Removal on Host Mitigation - T1070",shape=ellipse];"mitre-enterprise-attack-course-of-action=Indicator Removal on Host Mitigation - T1070" -> "mitre-enterprise-attack-attack-pattern=Indicator Removal on Host - T1070" [label="mitigates",];} diff --git a/static/graphs/6cac62ce-550b-4793-8ee6-6a1b8836edb0.png b/static/graphs/6cac62ce-550b-4793-8ee6-6a1b8836edb0.png new file mode 100644 index 0000000..4dafc04 Binary files /dev/null and b/static/graphs/6cac62ce-550b-4793-8ee6-6a1b8836edb0.png differ diff --git a/static/graphs/6d180bd7-3c77-4faf-b98b-dc2ab5f49101 b/static/graphs/6d180bd7-3c77-4faf-b98b-dc2ab5f49101 new file mode 100644 index 0000000..58ef544 --- /dev/null +++ b/static/graphs/6d180bd7-3c77-4faf-b98b-dc2ab5f49101 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=X-Tunnel" [label="tool\nX-Tunnel",shape=box,style=filled,color=deepskyblue];"tool=X-Tunnel" -> "mitre-enterprise-attack-malware=XTunnel - S0117" [label="similar",dir="both"];"tool=X-Tunnel" -> "malpedia=XTunnel" [label="similar",dir="both"];"mitre-enterprise-attack-malware=XTunnel - S0117" [label="mitre-enterprise-attack-malware\nXTunnel - S0117",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=XTunnel - S0117" -> "mitre-enterprise-attack-attack-pattern=Fallback Channels - T1008" [label="uses",];} diff --git a/static/graphs/6d180bd7-3c77-4faf-b98b-dc2ab5f49101.png b/static/graphs/6d180bd7-3c77-4faf-b98b-dc2ab5f49101.png new file mode 100644 index 0000000..efd545c Binary files /dev/null and b/static/graphs/6d180bd7-3c77-4faf-b98b-dc2ab5f49101.png differ diff --git a/static/graphs/6d1e2736-d363-49aa-9054-9c9e4ac0c520 b/static/graphs/6d1e2736-d363-49aa-9054-9c9e4ac0c520 new file mode 100644 index 0000000..de11975 --- /dev/null +++ b/static/graphs/6d1e2736-d363-49aa-9054-9c9e4ac0c520 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=OLDBAIT" [label="tool\nOLDBAIT",shape=box,style=filled,color=deepskyblue];"tool=OLDBAIT" -> "mitre-enterprise-attack-malware=OLDBAIT - S0138" [label="similar",dir="both"];"mitre-enterprise-attack-malware=OLDBAIT - S0138" [label="mitre-enterprise-attack-malware\nOLDBAIT - S0138",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=OLDBAIT - S0138" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];} diff --git a/static/graphs/6d1e2736-d363-49aa-9054-9c9e4ac0c520.png b/static/graphs/6d1e2736-d363-49aa-9054-9c9e4ac0c520.png new file mode 100644 index 0000000..638be85 Binary files /dev/null and b/static/graphs/6d1e2736-d363-49aa-9054-9c9e4ac0c520.png differ diff --git a/static/graphs/6d50a8a2-fdf5-11e8-9db3-833f231caac8 b/static/graphs/6d50a8a2-fdf5-11e8-9db3-833f231caac8 new file mode 100644 index 0000000..e19a843 --- /dev/null +++ b/static/graphs/6d50a8a2-fdf5-11e8-9db3-833f231caac8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=GC02" [label="threat-actor\nGC02",shape=octagon,style=filled,color=indianred1];"threat-actor=GC02" -> "threat-actor=GC01" [label="similar",dir="both"];"threat-actor=GC01" [label="threat-actor\nGC01",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/6d50a8a2-fdf5-11e8-9db3-833f231caac8.png b/static/graphs/6d50a8a2-fdf5-11e8-9db3-833f231caac8.png new file mode 100644 index 0000000..49d42ec Binary files /dev/null and b/static/graphs/6d50a8a2-fdf5-11e8-9db3-833f231caac8.png differ diff --git a/static/graphs/6dd05630-9bd8-11e8-a8b9-47ce338a4367 b/static/graphs/6dd05630-9bd8-11e8-a8b9-47ce338a4367 new file mode 100644 index 0000000..a973af5 --- /dev/null +++ b/static/graphs/6dd05630-9bd8-11e8-a8b9-47ce338a4367 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=PsExec" [label="tool\nPsExec",shape=box,style=filled,color=deepskyblue];"tool=PsExec" -> "mitre-enterprise-attack-tool=PsExec - S0029" [label="similar",dir="both"];"mitre-enterprise-attack-tool=PsExec - S0029" [label="mitre-enterprise-attack-tool\nPsExec - S0029",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=PsExec - S0029" -> "mitre-enterprise-attack-attack-pattern=Windows Admin Shares - T1077" [label="uses",];} diff --git a/static/graphs/6dd05630-9bd8-11e8-a8b9-47ce338a4367.png b/static/graphs/6dd05630-9bd8-11e8-a8b9-47ce338a4367.png new file mode 100644 index 0000000..5985531 Binary files /dev/null and b/static/graphs/6dd05630-9bd8-11e8-a8b9-47ce338a4367.png differ diff --git a/static/graphs/6deb9f26-969b-45aa-9222-c23663fd6ef8 b/static/graphs/6deb9f26-969b-45aa-9222-c23663fd6ef8 new file mode 100644 index 0000000..0680054 --- /dev/null +++ b/static/graphs/6deb9f26-969b-45aa-9222-c23663fd6ef8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Chthonic" [label="banker\nChthonic",shape=box,style=filled,color=deepskyblue];"banker=Chthonic" -> "malpedia=Chthonic" [label="similar",dir="both"];} diff --git a/static/graphs/6deb9f26-969b-45aa-9222-c23663fd6ef8.png b/static/graphs/6deb9f26-969b-45aa-9222-c23663fd6ef8.png new file mode 100644 index 0000000..9112f79 Binary files /dev/null and b/static/graphs/6deb9f26-969b-45aa-9222-c23663fd6ef8.png differ diff --git a/static/graphs/6e1168e6-7768-4fa2-951f-6d6934531633 b/static/graphs/6e1168e6-7768-4fa2-951f-6d6934531633 new file mode 100644 index 0000000..fe0176e --- /dev/null +++ b/static/graphs/6e1168e6-7768-4fa2-951f-6d6934531633 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Akbot" [label="botnet\nAkbot",shape=box,style=filled,color=deepskyblue];"botnet=Akbot" -> "tool=Akbot" [label="similar",dir="both"];"tool=Akbot" [label="tool\nAkbot",shape=box,style=filled,color=deepskyblue];"tool=Akbot" -> "banker=Qakbot" [label="similar",dir="both"];"tool=Akbot" -> "malpedia=QakBot" [label="similar",dir="both"];"banker=Qakbot" [label="banker\nQakbot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/6e1168e6-7768-4fa2-951f-6d6934531633.png b/static/graphs/6e1168e6-7768-4fa2-951f-6d6934531633.png new file mode 100644 index 0000000..4d5f23b Binary files /dev/null and b/static/graphs/6e1168e6-7768-4fa2-951f-6d6934531633.png differ diff --git a/static/graphs/6e7db820-9735-4545-bc64-039bc4ce354b b/static/graphs/6e7db820-9735-4545-bc64-039bc4ce354b new file mode 100644 index 0000000..b88ba40 --- /dev/null +++ b/static/graphs/6e7db820-9735-4545-bc64-039bc4ce354b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=LC_MAIN Hijacking Mitigation - T1149" [label="mitre-enterprise-attack-course-of-action\nLC_MAIN Hijacking Mitigation - T1149",shape=ellipse];"mitre-enterprise-attack-course-of-action=LC_MAIN Hijacking Mitigation - T1149" -> "mitre-enterprise-attack-attack-pattern=LC_MAIN Hijacking - T1149" [label="mitigates",];} diff --git a/static/graphs/6e7db820-9735-4545-bc64-039bc4ce354b.png b/static/graphs/6e7db820-9735-4545-bc64-039bc4ce354b.png new file mode 100644 index 0000000..2cfad74 Binary files /dev/null and b/static/graphs/6e7db820-9735-4545-bc64-039bc4ce354b.png differ diff --git a/static/graphs/6ea032a0-d54a-463b-b016-2b7b9b9a5b7e b/static/graphs/6ea032a0-d54a-463b-b016-2b7b9b9a5b7e new file mode 100644 index 0000000..29c0b00 --- /dev/null +++ b/static/graphs/6ea032a0-d54a-463b-b016-2b7b9b9a5b7e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=NavRAT" [label="rat\nNavRAT",shape=box,style=filled,color=deepskyblue];"rat=NavRAT" -> "malpedia=NavRAT" [label="similar",dir="both"];} diff --git a/static/graphs/6ea032a0-d54a-463b-b016-2b7b9b9a5b7e.png b/static/graphs/6ea032a0-d54a-463b-b016-2b7b9b9a5b7e.png new file mode 100644 index 0000000..75c27e6 Binary files /dev/null and b/static/graphs/6ea032a0-d54a-463b-b016-2b7b9b9a5b7e.png differ diff --git a/static/graphs/6eb15569-4ddd-4820-9a44-7bca5b303b86 b/static/graphs/6eb15569-4ddd-4820-9a44-7bca5b303b86 new file mode 100644 index 0000000..ba8e49a --- /dev/null +++ b/static/graphs/6eb15569-4ddd-4820-9a44-7bca5b303b86 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"exploit-kit=Empire" [label="exploit-kit\nEmpire",shape=box,style=filled,color=deepskyblue];"exploit-kit=Empire" -> "tool=Empire" [label="similar",dir="both"];"tool=Empire" [label="tool\nEmpire",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/6eb15569-4ddd-4820-9a44-7bca5b303b86.png b/static/graphs/6eb15569-4ddd-4820-9a44-7bca5b303b86.png new file mode 100644 index 0000000..a083210 Binary files /dev/null and b/static/graphs/6eb15569-4ddd-4820-9a44-7bca5b303b86.png differ diff --git a/static/graphs/6ef11b6e-d81a-465b-9dce-fab5c6fe807b b/static/graphs/6ef11b6e-d81a-465b-9dce-fab5c6fe807b new file mode 100644 index 0000000..7d3578a --- /dev/null +++ b/static/graphs/6ef11b6e-d81a-465b-9dce-fab5c6fe807b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=FireMalv" [label="tool\nFireMalv",shape=box,style=filled,color=deepskyblue];"tool=FireMalv" -> "malpedia=FireMalv" [label="similar",dir="both"];} diff --git a/static/graphs/6ef11b6e-d81a-465b-9dce-fab5c6fe807b.png b/static/graphs/6ef11b6e-d81a-465b-9dce-fab5c6fe807b.png new file mode 100644 index 0000000..f0b18a4 Binary files /dev/null and b/static/graphs/6ef11b6e-d81a-465b-9dce-fab5c6fe807b.png differ diff --git a/static/graphs/6efa425c-3731-44fd-9224-2a62df061a2d b/static/graphs/6efa425c-3731-44fd-9224-2a62df061a2d new file mode 100644 index 0000000..cbf9182 --- /dev/null +++ b/static/graphs/6efa425c-3731-44fd-9224-2a62df061a2d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Quasar RAT" [label="rat\nQuasar RAT",shape=box,style=filled,color=deepskyblue];"rat=Quasar RAT" -> "malpedia=Quasar RAT" [label="similar",dir="both"];} diff --git a/static/graphs/6efa425c-3731-44fd-9224-2a62df061a2d.png b/static/graphs/6efa425c-3731-44fd-9224-2a62df061a2d.png new file mode 100644 index 0000000..d2371d3 Binary files /dev/null and b/static/graphs/6efa425c-3731-44fd-9224-2a62df061a2d.png differ diff --git a/static/graphs/6fb1ea9e-5389-4932-8b22-c691b74b75a8 b/static/graphs/6fb1ea9e-5389-4932-8b22-c691b74b75a8 new file mode 100644 index 0000000..0fede6b --- /dev/null +++ b/static/graphs/6fb1ea9e-5389-4932-8b22-c691b74b75a8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Sekhmet" [label="ransomware\nSekhmet",shape=box,style=filled,color=deepskyblue];"ransomware=Sekhmet" -> "ransomware=Egregor" [label="similar",dir="both"];"ransomware=Egregor" [label="ransomware\nEgregor",shape=box,style=filled,color=deepskyblue];"ransomware=Egregor" -> "ransomware=Sekhmet" [label="variant-of",];} diff --git a/static/graphs/6fb1ea9e-5389-4932-8b22-c691b74b75a8.png b/static/graphs/6fb1ea9e-5389-4932-8b22-c691b74b75a8.png new file mode 100644 index 0000000..e013e22 Binary files /dev/null and b/static/graphs/6fb1ea9e-5389-4932-8b22-c691b74b75a8.png differ diff --git a/static/graphs/6fe5f49d-48b5-4dc2-92f7-8c94397b9c96 b/static/graphs/6fe5f49d-48b5-4dc2-92f7-8c94397b9c96 new file mode 100644 index 0000000..e127032 --- /dev/null +++ b/static/graphs/6fe5f49d-48b5-4dc2-92f7-8c94397b9c96 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Sality" [label="botnet\nSality",shape=box,style=filled,color=deepskyblue];"botnet=Sality" -> "malpedia=Sality" [label="similar",dir="both"];} diff --git a/static/graphs/6fe5f49d-48b5-4dc2-92f7-8c94397b9c96.png b/static/graphs/6fe5f49d-48b5-4dc2-92f7-8c94397b9c96.png new file mode 100644 index 0000000..da40c5f Binary files /dev/null and b/static/graphs/6fe5f49d-48b5-4dc2-92f7-8c94397b9c96.png differ diff --git a/static/graphs/7009ba4d-83d4-4851-9fbb-e09e28497765 b/static/graphs/7009ba4d-83d4-4851-9fbb-e09e28497765 new file mode 100644 index 0000000..e06e5ff --- /dev/null +++ b/static/graphs/7009ba4d-83d4-4851-9fbb-e09e28497765 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Forced Authentication Mitigation - T1187" [label="mitre-enterprise-attack-course-of-action\nForced Authentication Mitigation - T1187",shape=ellipse];"mitre-enterprise-attack-course-of-action=Forced Authentication Mitigation - T1187" -> "mitre-enterprise-attack-attack-pattern=Forced Authentication - T1187" [label="mitigates",];} diff --git a/static/graphs/7009ba4d-83d4-4851-9fbb-e09e28497765.png b/static/graphs/7009ba4d-83d4-4851-9fbb-e09e28497765.png new file mode 100644 index 0000000..5207d42 Binary files /dev/null and b/static/graphs/7009ba4d-83d4-4851-9fbb-e09e28497765.png differ diff --git a/static/graphs/7036fb3d-86b7-4d9c-bc66-1e1ead8b7840 b/static/graphs/7036fb3d-86b7-4d9c-bc66-1e1ead8b7840 new file mode 100644 index 0000000..b5c0123 --- /dev/null +++ b/static/graphs/7036fb3d-86b7-4d9c-bc66-1e1ead8b7840 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Equation Group" [label="threat-actor\nEquation Group",shape=octagon,style=filled,color=indianred1];"threat-actor=Equation Group" -> "threat-actor=Longhorn" [label="similar",dir="both"];"threat-actor=Longhorn" [label="threat-actor\nLonghorn",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/7036fb3d-86b7-4d9c-bc66-1e1ead8b7840.png b/static/graphs/7036fb3d-86b7-4d9c-bc66-1e1ead8b7840.png new file mode 100644 index 0000000..5edc066 Binary files /dev/null and b/static/graphs/7036fb3d-86b7-4d9c-bc66-1e1ead8b7840.png differ diff --git a/static/graphs/705f0783-5f7d-4491-b6b7-9628e6e006d2 b/static/graphs/705f0783-5f7d-4491-b6b7-9628e6e006d2 new file mode 100644 index 0000000..b76ff61 --- /dev/null +++ b/static/graphs/705f0783-5f7d-4491-b6b7-9628e6e006d2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=NanHaiShu - S0228" [label="mitre-enterprise-attack-malware\nNanHaiShu - S0228",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=NanHaiShu - S0228" -> "tool=NanHaiShu" [label="similar",dir="both"];"mitre-enterprise-attack-malware=NanHaiShu - S0228" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];"tool=NanHaiShu" [label="tool\nNanHaiShu",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/705f0783-5f7d-4491-b6b7-9628e6e006d2.png b/static/graphs/705f0783-5f7d-4491-b6b7-9628e6e006d2.png new file mode 100644 index 0000000..4bf6ef2 Binary files /dev/null and b/static/graphs/705f0783-5f7d-4491-b6b7-9628e6e006d2.png differ diff --git a/static/graphs/70c31066-237a-11e8-8eff-37ef1ad0c703 b/static/graphs/70c31066-237a-11e8-8eff-37ef1ad0c703 new file mode 100644 index 0000000..4a0e977 --- /dev/null +++ b/static/graphs/70c31066-237a-11e8-8eff-37ef1ad0c703 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Aurora" [label="tool\nAurora",shape=box,style=filled,color=deepskyblue];"tool=Aurora" -> "mitre-enterprise-attack-malware=Hydraq - S0203" [label="similar",dir="both"];"tool=Aurora" -> "malpedia=9002 RAT" [label="similar",dir="both"];"tool=Aurora" -> "malpedia=Aurora" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Hydraq - S0203" [label="mitre-enterprise-attack-malware\nHydraq - S0203",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Hydraq - S0203" -> "mitre-enterprise-attack-attack-pattern=New Service - T1050" [label="uses",];} diff --git a/static/graphs/70c31066-237a-11e8-8eff-37ef1ad0c703.png b/static/graphs/70c31066-237a-11e8-8eff-37ef1ad0c703.png new file mode 100644 index 0000000..f80fe52 Binary files /dev/null and b/static/graphs/70c31066-237a-11e8-8eff-37ef1ad0c703.png differ diff --git a/static/graphs/70ca8408-bc45-4d39-acd2-9190ba15ea97 b/static/graphs/70ca8408-bc45-4d39-acd2-9190ba15ea97 new file mode 100644 index 0000000..ab07fbd --- /dev/null +++ b/static/graphs/70ca8408-bc45-4d39-acd2-9190ba15ea97 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=KARAE" [label="tool\nKARAE",shape=box,style=filled,color=deepskyblue];"tool=KARAE" -> "mitre-enterprise-attack-malware=KARAE - S0215" [label="similar",dir="both"];"mitre-enterprise-attack-malware=KARAE - S0215" [label="mitre-enterprise-attack-malware\nKARAE - S0215",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=KARAE - S0215" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/70ca8408-bc45-4d39-acd2-9190ba15ea97.png b/static/graphs/70ca8408-bc45-4d39-acd2-9190ba15ea97.png new file mode 100644 index 0000000..24e3ec3 Binary files /dev/null and b/static/graphs/70ca8408-bc45-4d39-acd2-9190ba15ea97.png differ diff --git a/static/graphs/7113eaa5-ba79-4fb3-b68a-398ee9cd698e b/static/graphs/7113eaa5-ba79-4fb3-b68a-398ee9cd698e new file mode 100644 index 0000000..884d29c --- /dev/null +++ b/static/graphs/7113eaa5-ba79-4fb3-b68a-398ee9cd698e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Leviathan - G0065" [label="mitre-enterprise-attack-intrusion-set\nLeviathan - G0065",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Leviathan - G0065" -> "threat-actor=Leviathan" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Leviathan - G0065" -> "mitre-enterprise-attack-attack-pattern=Windows Management Instrumentation Event Subscription - T1084" [label="uses",];"threat-actor=Leviathan" [label="threat-actor\nLeviathan",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/7113eaa5-ba79-4fb3-b68a-398ee9cd698e.png b/static/graphs/7113eaa5-ba79-4fb3-b68a-398ee9cd698e.png new file mode 100644 index 0000000..4847aa2 Binary files /dev/null and b/static/graphs/7113eaa5-ba79-4fb3-b68a-398ee9cd698e.png differ diff --git a/static/graphs/721ba430-fd28-454c-8512-24339ef2235f b/static/graphs/721ba430-fd28-454c-8512-24339ef2235f new file mode 100644 index 0000000..a0efbb1 --- /dev/null +++ b/static/graphs/721ba430-fd28-454c-8512-24339ef2235f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=FireCrypt" [label="ransomware\nFireCrypt",shape=box,style=filled,color=deepskyblue];"ransomware=FireCrypt" -> "malpedia=FireCrypt" [label="similar",dir="both"];} diff --git a/static/graphs/721ba430-fd28-454c-8512-24339ef2235f.png b/static/graphs/721ba430-fd28-454c-8512-24339ef2235f.png new file mode 100644 index 0000000..23c8553 Binary files /dev/null and b/static/graphs/721ba430-fd28-454c-8512-24339ef2235f.png differ diff --git a/static/graphs/7296f769-9bb7-474d-bbc7-5839f71d052a b/static/graphs/7296f769-9bb7-474d-bbc7-5839f71d052a new file mode 100644 index 0000000..97d3a2b --- /dev/null +++ b/static/graphs/7296f769-9bb7-474d-bbc7-5839f71d052a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Marina Botnet" [label="botnet\nMarina Botnet",shape=box,style=filled,color=deepskyblue];"botnet=Marina Botnet" -> "botnet=Kraken" [label="similar",dir="both"];"botnet=Kraken" [label="botnet\nKraken",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/7296f769-9bb7-474d-bbc7-5839f71d052a.png b/static/graphs/7296f769-9bb7-474d-bbc7-5839f71d052a.png new file mode 100644 index 0000000..29470e3 Binary files /dev/null and b/static/graphs/7296f769-9bb7-474d-bbc7-5839f71d052a.png differ diff --git a/static/graphs/72b702d9-43c3-40b9-b004-8d0671225fb8 b/static/graphs/72b702d9-43c3-40b9-b004-8d0671225fb8 new file mode 100644 index 0000000..0286937 --- /dev/null +++ b/static/graphs/72b702d9-43c3-40b9-b004-8d0671225fb8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=KHRAT" [label="tool\nKHRAT",shape=box,style=filled,color=deepskyblue];"tool=KHRAT" -> "malpedia=KHRAT" [label="similar",dir="both"];} diff --git a/static/graphs/72b702d9-43c3-40b9-b004-8d0671225fb8.png b/static/graphs/72b702d9-43c3-40b9-b004-8d0671225fb8.png new file mode 100644 index 0000000..607436a Binary files /dev/null and b/static/graphs/72b702d9-43c3-40b9-b004-8d0671225fb8.png differ diff --git a/static/graphs/72c8d526-1247-42d4-919c-6d7a31ca8f39 b/static/graphs/72c8d526-1247-42d4-919c-6d7a31ca8f39 new file mode 100644 index 0000000..5751ae9 --- /dev/null +++ b/static/graphs/72c8d526-1247-42d4-919c-6d7a31ca8f39 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Obfuscate infrastructure - PRE-T1108" [label="mitre-pre-attack-attack-pattern\nObfuscate infrastructure - PRE-T1108",shape=ellipse];"mitre-pre-attack-attack-pattern=Obfuscate infrastructure - PRE-T1108" -> "mitre-pre-attack-attack-pattern=Obfuscate infrastructure - PRE-T1086" [label="related-to",];"mitre-pre-attack-attack-pattern=Obfuscate infrastructure - PRE-T1086" [label="mitre-pre-attack-attack-pattern\nObfuscate infrastructure - PRE-T1086",shape=ellipse];"mitre-pre-attack-attack-pattern=Obfuscate infrastructure - PRE-T1086" -> "mitre-pre-attack-attack-pattern=Obfuscate infrastructure - PRE-T1108" [label="related-to",];} diff --git a/static/graphs/72c8d526-1247-42d4-919c-6d7a31ca8f39.png b/static/graphs/72c8d526-1247-42d4-919c-6d7a31ca8f39.png new file mode 100644 index 0000000..37c0105 Binary files /dev/null and b/static/graphs/72c8d526-1247-42d4-919c-6d7a31ca8f39.png differ diff --git a/static/graphs/72f54d66-675d-4587-9bd3-4ed09f9522e4 b/static/graphs/72f54d66-675d-4587-9bd3-4ed09f9522e4 new file mode 100644 index 0000000..61fdb65 --- /dev/null +++ b/static/graphs/72f54d66-675d-4587-9bd3-4ed09f9522e4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Carbanak - S0030" [label="mitre-enterprise-attack-malware\nCarbanak - S0030",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Carbanak - S0030" -> "malpedia=Carbanak" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Carbanak - S0030" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];} diff --git a/static/graphs/72f54d66-675d-4587-9bd3-4ed09f9522e4.png b/static/graphs/72f54d66-675d-4587-9bd3-4ed09f9522e4.png new file mode 100644 index 0000000..39795f7 Binary files /dev/null and b/static/graphs/72f54d66-675d-4587-9bd3-4ed09f9522e4.png differ diff --git a/static/graphs/731e4a5e-35f2-47b1-80ba-150b95fdc14d b/static/graphs/731e4a5e-35f2-47b1-80ba-150b95fdc14d new file mode 100644 index 0000000..4ed76bb --- /dev/null +++ b/static/graphs/731e4a5e-35f2-47b1-80ba-150b95fdc14d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Samas-Samsam" [label="ransomware\nSamas-Samsam",shape=box,style=filled,color=deepskyblue];"ransomware=Samas-Samsam" -> "malpedia=SamSam" [label="similar",dir="both"];} diff --git a/static/graphs/731e4a5e-35f2-47b1-80ba-150b95fdc14d.png b/static/graphs/731e4a5e-35f2-47b1-80ba-150b95fdc14d.png new file mode 100644 index 0000000..3c44281 Binary files /dev/null and b/static/graphs/731e4a5e-35f2-47b1-80ba-150b95fdc14d.png differ diff --git a/static/graphs/7331c66a-5601-4d3f-acf6-ad9e3035eb40 b/static/graphs/7331c66a-5601-4d3f-acf6-ad9e3035eb40 new file mode 100644 index 0000000..1cf0a15 --- /dev/null +++ b/static/graphs/7331c66a-5601-4d3f-acf6-ad9e3035eb40 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Group5 - G0043" [label="mitre-enterprise-attack-intrusion-set\nGroup5 - G0043",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Group5 - G0043" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];} diff --git a/static/graphs/7331c66a-5601-4d3f-acf6-ad9e3035eb40.png b/static/graphs/7331c66a-5601-4d3f-acf6-ad9e3035eb40.png new file mode 100644 index 0000000..6babe8b Binary files /dev/null and b/static/graphs/7331c66a-5601-4d3f-acf6-ad9e3035eb40.png differ diff --git a/static/graphs/7343e208-7cab-45f2-a47b-41ba5e2f0fab b/static/graphs/7343e208-7cab-45f2-a47b-41ba5e2f0fab new file mode 100644 index 0000000..68ce1ea --- /dev/null +++ b/static/graphs/7343e208-7cab-45f2-a47b-41ba5e2f0fab @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=XTunnel - S0117" [label="mitre-enterprise-attack-malware\nXTunnel - S0117",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=XTunnel - S0117" -> "tool=X-Tunnel" [label="similar",dir="both"];"mitre-enterprise-attack-malware=XTunnel - S0117" -> "malpedia=XTunnel" [label="similar",dir="both"];"mitre-enterprise-attack-malware=XTunnel - S0117" -> "mitre-enterprise-attack-attack-pattern=Fallback Channels - T1008" [label="uses",];"tool=X-Tunnel" [label="tool\nX-Tunnel",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/7343e208-7cab-45f2-a47b-41ba5e2f0fab.png b/static/graphs/7343e208-7cab-45f2-a47b-41ba5e2f0fab.png new file mode 100644 index 0000000..a292d21 Binary files /dev/null and b/static/graphs/7343e208-7cab-45f2-a47b-41ba5e2f0fab.png differ diff --git a/static/graphs/7362581a-a7d1-4060-b225-e227f2df2b60 b/static/graphs/7362581a-a7d1-4060-b225-e227f2df2b60 new file mode 100644 index 0000000..a43c28b --- /dev/null +++ b/static/graphs/7362581a-a7d1-4060-b225-e227f2df2b60 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=htpRAT" [label="rat\nhtpRAT",shape=box,style=filled,color=deepskyblue];"rat=htpRAT" -> "malpedia=htpRAT" [label="similar",dir="both"];} diff --git a/static/graphs/7362581a-a7d1-4060-b225-e227f2df2b60.png b/static/graphs/7362581a-a7d1-4060-b225-e227f2df2b60.png new file mode 100644 index 0000000..e0b1866 Binary files /dev/null and b/static/graphs/7362581a-a7d1-4060-b225-e227f2df2b60.png differ diff --git a/static/graphs/73a4793a-ce55-4159-b2a6-208ef29b326f b/static/graphs/73a4793a-ce55-4159-b2a6-208ef29b326f new file mode 100644 index 0000000..b3690a8 --- /dev/null +++ b/static/graphs/73a4793a-ce55-4159-b2a6-208ef29b326f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Hydraq - S0203" [label="mitre-enterprise-attack-malware\nHydraq - S0203",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Hydraq - S0203" -> "tool=Aurora" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Hydraq - S0203" -> "malpedia=9002 RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Hydraq - S0203" -> "malpedia=Aurora" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Hydraq - S0203" -> "mitre-enterprise-attack-attack-pattern=New Service - T1050" [label="uses",];"tool=Aurora" [label="tool\nAurora",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/73a4793a-ce55-4159-b2a6-208ef29b326f.png b/static/graphs/73a4793a-ce55-4159-b2a6-208ef29b326f.png new file mode 100644 index 0000000..7c300ef Binary files /dev/null and b/static/graphs/73a4793a-ce55-4159-b2a6-208ef29b326f.png differ diff --git a/static/graphs/73cb7ecc-25e3-11e8-a97b-c35ec4e7dcf8 b/static/graphs/73cb7ecc-25e3-11e8-a97b-c35ec4e7dcf8 new file mode 100644 index 0000000..aea2413 --- /dev/null +++ b/static/graphs/73cb7ecc-25e3-11e8-a97b-c35ec4e7dcf8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Nautilus" [label="tool\nNautilus",shape=box,style=filled,color=deepskyblue];"tool=Nautilus" -> "malpedia=Nautilus" [label="similar",dir="both"];} diff --git a/static/graphs/73cb7ecc-25e3-11e8-a97b-c35ec4e7dcf8.png b/static/graphs/73cb7ecc-25e3-11e8-a97b-c35ec4e7dcf8.png new file mode 100644 index 0000000..8d3a07a Binary files /dev/null and b/static/graphs/73cb7ecc-25e3-11e8-a97b-c35ec4e7dcf8.png differ diff --git a/static/graphs/73e7d7d5-1782-4cd0-a4d7-00c7ec051c2a b/static/graphs/73e7d7d5-1782-4cd0-a4d7-00c7ec051c2a new file mode 100644 index 0000000..4fa5960 --- /dev/null +++ b/static/graphs/73e7d7d5-1782-4cd0-a4d7-00c7ec051c2a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Identify business relationships - PRE-T1060" [label="mitre-pre-attack-attack-pattern\nIdentify business relationships - PRE-T1060",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify business relationships - PRE-T1060" -> "mitre-pre-attack-attack-pattern=Identify business relationships - PRE-T1049" [label="related-to",];"mitre-pre-attack-attack-pattern=Identify business relationships - PRE-T1049" [label="mitre-pre-attack-attack-pattern\nIdentify business relationships - PRE-T1049",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify business relationships - PRE-T1049" -> "mitre-pre-attack-attack-pattern=Identify business relationships - PRE-T1060" [label="related-to",];} diff --git a/static/graphs/73e7d7d5-1782-4cd0-a4d7-00c7ec051c2a.png b/static/graphs/73e7d7d5-1782-4cd0-a4d7-00c7ec051c2a.png new file mode 100644 index 0000000..fbdf250 Binary files /dev/null and b/static/graphs/73e7d7d5-1782-4cd0-a4d7-00c7ec051c2a.png differ diff --git a/static/graphs/74167065-90b3-4c29-807a-79b6f098e45b b/static/graphs/74167065-90b3-4c29-807a-79b6f098e45b new file mode 100644 index 0000000..d8cb96b --- /dev/null +++ b/static/graphs/74167065-90b3-4c29-807a-79b6f098e45b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=KeyBoy" [label="tool\nKeyBoy",shape=box,style=filled,color=deepskyblue];"tool=KeyBoy" -> "malpedia=KeyBoy" [label="similar",dir="both"];"tool=KeyBoy" -> "malpedia=Yahoyah" [label="similar",dir="both"];"tool=KeyBoy" -> "tool=Yahoyah" [label="similar",dir="both"];"tool=Yahoyah" [label="tool\nYahoyah",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/74167065-90b3-4c29-807a-79b6f098e45b.png b/static/graphs/74167065-90b3-4c29-807a-79b6f098e45b.png new file mode 100644 index 0000000..78ec674 Binary files /dev/null and b/static/graphs/74167065-90b3-4c29-807a-79b6f098e45b.png differ diff --git a/static/graphs/7451bcf9-e6e6-4a70-bc3d-1599173d0035 b/static/graphs/7451bcf9-e6e6-4a70-bc3d-1599173d0035 new file mode 100644 index 0000000..7c48f50 --- /dev/null +++ b/static/graphs/7451bcf9-e6e6-4a70-bc3d-1599173d0035 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=HOMEFRY - S0232" [label="mitre-enterprise-attack-malware\nHOMEFRY - S0232",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=HOMEFRY - S0232" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];} diff --git a/static/graphs/7451bcf9-e6e6-4a70-bc3d-1599173d0035.png b/static/graphs/7451bcf9-e6e6-4a70-bc3d-1599173d0035.png new file mode 100644 index 0000000..ebec12b Binary files /dev/null and b/static/graphs/7451bcf9-e6e6-4a70-bc3d-1599173d0035.png differ diff --git a/static/graphs/74a3288e-eee9-4f8e-973a-fbc128e033f1 b/static/graphs/74a3288e-eee9-4f8e-973a-fbc128e033f1 new file mode 100644 index 0000000..1c227d7 --- /dev/null +++ b/static/graphs/74a3288e-eee9-4f8e-973a-fbc128e033f1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1026" [label="mitre-pre-attack-attack-pattern\nConduct social engineering - PRE-T1026",shape=ellipse];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1026" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" [label="related-to",];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" [label="mitre-pre-attack-attack-pattern\nConduct social engineering - PRE-T1045",shape=ellipse];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1026" [label="related-to",];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1056" [label="related-to",];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1056" [label="mitre-pre-attack-attack-pattern\nConduct social engineering - PRE-T1056",shape=ellipse];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1056" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" [label="related-to",];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1056" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1026" [label="related-to",];} diff --git a/static/graphs/74a3288e-eee9-4f8e-973a-fbc128e033f1.png b/static/graphs/74a3288e-eee9-4f8e-973a-fbc128e033f1.png new file mode 100644 index 0000000..4d55473 Binary files /dev/null and b/static/graphs/74a3288e-eee9-4f8e-973a-fbc128e033f1.png differ diff --git a/static/graphs/74bd8c09-73d5-4ad8-ab1f-e94a4853c936 b/static/graphs/74bd8c09-73d5-4ad8-ab1f-e94a4853c936 new file mode 100644 index 0000000..b5ec88a --- /dev/null +++ b/static/graphs/74bd8c09-73d5-4ad8-ab1f-e94a4853c936 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=MM Core" [label="tool\nMM Core",shape=box,style=filled,color=deepskyblue];"tool=MM Core" -> "malpedia=MM Core" [label="similar",dir="both"];} diff --git a/static/graphs/74bd8c09-73d5-4ad8-ab1f-e94a4853c936.png b/static/graphs/74bd8c09-73d5-4ad8-ab1f-e94a4853c936.png new file mode 100644 index 0000000..067dd79 Binary files /dev/null and b/static/graphs/74bd8c09-73d5-4ad8-ab1f-e94a4853c936.png differ diff --git a/static/graphs/74febc44-8955-4e4d-aca0-d4dad2f967d7 b/static/graphs/74febc44-8955-4e4d-aca0-d4dad2f967d7 new file mode 100644 index 0000000..1c1ecb1 --- /dev/null +++ b/static/graphs/74febc44-8955-4e4d-aca0-d4dad2f967d7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Process Injection Mitigation - T1055" [label="mitre-enterprise-attack-course-of-action\nProcess Injection Mitigation - T1055",shape=ellipse];"mitre-enterprise-attack-course-of-action=Process Injection Mitigation - T1055" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="mitigates",];} diff --git a/static/graphs/74febc44-8955-4e4d-aca0-d4dad2f967d7.png b/static/graphs/74febc44-8955-4e4d-aca0-d4dad2f967d7.png new file mode 100644 index 0000000..611d87b Binary files /dev/null and b/static/graphs/74febc44-8955-4e4d-aca0-d4dad2f967d7.png differ diff --git a/static/graphs/752db800-ea54-4e7a-b4c1-2a0292350ea7 b/static/graphs/752db800-ea54-4e7a-b4c1-2a0292350ea7 new file mode 100644 index 0000000..ccc0919 --- /dev/null +++ b/static/graphs/752db800-ea54-4e7a-b4c1-2a0292350ea7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Multi-hop Proxy Mitigation - T1188" [label="mitre-enterprise-attack-course-of-action\nMulti-hop Proxy Mitigation - T1188",shape=ellipse];"mitre-enterprise-attack-course-of-action=Multi-hop Proxy Mitigation - T1188" -> "mitre-enterprise-attack-attack-pattern=Multi-hop Proxy - T1188" [label="mitigates",];} diff --git a/static/graphs/752db800-ea54-4e7a-b4c1-2a0292350ea7.png b/static/graphs/752db800-ea54-4e7a-b4c1-2a0292350ea7.png new file mode 100644 index 0000000..23f3c40 Binary files /dev/null and b/static/graphs/752db800-ea54-4e7a-b4c1-2a0292350ea7.png differ diff --git a/static/graphs/7551188b-8f91-4d34-8350-0d0c57b2b913 b/static/graphs/7551188b-8f91-4d34-8350-0d0c57b2b913 new file mode 100644 index 0000000..78db1a7 --- /dev/null +++ b/static/graphs/7551188b-8f91-4d34-8350-0d0c57b2b913 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Elise - S0081" [label="mitre-enterprise-attack-malware\nElise - S0081",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Elise - S0081" -> "tool=Elise Backdoor" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Elise - S0081" -> "malpedia=Elise" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Elise - S0081" -> "mitre-enterprise-attack-attack-pattern=New Service - T1050" [label="uses",];"tool=Elise Backdoor" [label="tool\nElise Backdoor",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/7551188b-8f91-4d34-8350-0d0c57b2b913.png b/static/graphs/7551188b-8f91-4d34-8350-0d0c57b2b913.png new file mode 100644 index 0000000..f5b5081 Binary files /dev/null and b/static/graphs/7551188b-8f91-4d34-8350-0d0c57b2b913.png differ diff --git a/static/graphs/7574c7f1-5075-4230-aca9-d6c0956f1fac b/static/graphs/7574c7f1-5075-4230-aca9-d6c0956f1fac new file mode 100644 index 0000000..9bd157f --- /dev/null +++ b/static/graphs/7574c7f1-5075-4230-aca9-d6c0956f1fac @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=MacRansom" [label="ransomware\nMacRansom",shape=box,style=filled,color=deepskyblue];"ransomware=MacRansom" -> "malpedia=MacRansom" [label="similar",dir="both"];} diff --git a/static/graphs/7574c7f1-5075-4230-aca9-d6c0956f1fac.png b/static/graphs/7574c7f1-5075-4230-aca9-d6c0956f1fac.png new file mode 100644 index 0000000..f93d6ac Binary files /dev/null and b/static/graphs/7574c7f1-5075-4230-aca9-d6c0956f1fac.png differ diff --git a/static/graphs/75b01a1e-3269-4f4c-bdba-37af4e9c3f54 b/static/graphs/75b01a1e-3269-4f4c-bdba-37af4e9c3f54 new file mode 100644 index 0000000..8754772 --- /dev/null +++ b/static/graphs/75b01a1e-3269-4f4c-bdba-37af4e9c3f54 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Snifula" [label="tool\nSnifula",shape=box,style=filled,color=deepskyblue];"tool=Snifula" -> "banker=Gozi" [label="similar",dir="both"];"tool=Snifula" -> "malpedia=Gozi" [label="similar",dir="both"];"tool=Snifula" -> "malpedia=Snifula" [label="similar",dir="both"];"banker=Gozi" [label="banker\nGozi",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/75b01a1e-3269-4f4c-bdba-37af4e9c3f54.png b/static/graphs/75b01a1e-3269-4f4c-bdba-37af4e9c3f54.png new file mode 100644 index 0000000..c3e0624 Binary files /dev/null and b/static/graphs/75b01a1e-3269-4f4c-bdba-37af4e9c3f54.png differ diff --git a/static/graphs/75f53ead-1aee-4f91-8cb9-b4170d747cfc b/static/graphs/75f53ead-1aee-4f91-8cb9-b4170d747cfc new file mode 100644 index 0000000..1fb4acf --- /dev/null +++ b/static/graphs/75f53ead-1aee-4f91-8cb9-b4170d747cfc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Tinba" [label="tool\nTinba",shape=box,style=filled,color=deepskyblue];"tool=Tinba" -> "exploit-kit=Hunter" [label="similar",dir="both"];"tool=Tinba" -> "banker=Tinba" [label="similar",dir="both"];"tool=Tinba" -> "malpedia=Tinba" [label="similar",dir="both"];"banker=Tinba" [label="banker\nTinba",shape=box,style=filled,color=deepskyblue];"exploit-kit=Hunter" [label="exploit-kit\nHunter",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/75f53ead-1aee-4f91-8cb9-b4170d747cfc.png b/static/graphs/75f53ead-1aee-4f91-8cb9-b4170d747cfc.png new file mode 100644 index 0000000..22cf63d Binary files /dev/null and b/static/graphs/75f53ead-1aee-4f91-8cb9-b4170d747cfc.png differ diff --git a/static/graphs/7636484c-adc5-45d4-9bfe-c3e062fbc4a0 b/static/graphs/7636484c-adc5-45d4-9bfe-c3e062fbc4a0 new file mode 100644 index 0000000..ab11d0a --- /dev/null +++ b/static/graphs/7636484c-adc5-45d4-9bfe-c3e062fbc4a0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "threat-actor=Charming Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "threat-actor=Flying Kitten" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "threat-actor=Rocket Kitten" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "threat-actor=Cleaver" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "threat-actor=OilRig" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "threat-actor=Clever Kitten" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "threat-actor=CHRYSENE" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Cutting Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "threat-actor=Greenbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/7636484c-adc5-45d4-9bfe-c3e062fbc4a0.png b/static/graphs/7636484c-adc5-45d4-9bfe-c3e062fbc4a0.png new file mode 100644 index 0000000..27046d2 Binary files /dev/null and b/static/graphs/7636484c-adc5-45d4-9bfe-c3e062fbc4a0.png differ diff --git a/static/graphs/76abb3ef-dafd-4762-97cb-a35379429db4 b/static/graphs/76abb3ef-dafd-4762-97cb-a35379429db4 new file mode 100644 index 0000000..be4539d --- /dev/null +++ b/static/graphs/76abb3ef-dafd-4762-97cb-a35379429db4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Gazer - S0168" [label="mitre-enterprise-attack-malware\nGazer - S0168",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Gazer - S0168" -> "malpedia=Gazer" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Gazer - S0168" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];} diff --git a/static/graphs/76abb3ef-dafd-4762-97cb-a35379429db4.png b/static/graphs/76abb3ef-dafd-4762-97cb-a35379429db4.png new file mode 100644 index 0000000..495266d Binary files /dev/null and b/static/graphs/76abb3ef-dafd-4762-97cb-a35379429db4.png differ diff --git a/static/graphs/76d5c7a2-73c3-11e8-bd92-db4d715af093 b/static/graphs/76d5c7a2-73c3-11e8-bd92-db4d715af093 new file mode 100644 index 0000000..582f7c9 --- /dev/null +++ b/static/graphs/76d5c7a2-73c3-11e8-bd92-db4d715af093 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Olympic Destroyer" [label="tool\nOlympic Destroyer",shape=box,style=filled,color=deepskyblue];"tool=Olympic Destroyer" -> "malpedia=Olympic Destroyer" [label="similar",dir="both"];} diff --git a/static/graphs/76d5c7a2-73c3-11e8-bd92-db4d715af093.png b/static/graphs/76d5c7a2-73c3-11e8-bd92-db4d715af093.png new file mode 100644 index 0000000..d398f67 Binary files /dev/null and b/static/graphs/76d5c7a2-73c3-11e8-bd92-db4d715af093.png differ diff --git a/static/graphs/76ec1827-68a1-488f-9899-2b788ea8db64 b/static/graphs/76ec1827-68a1-488f-9899-2b788ea8db64 new file mode 100644 index 0000000..02965ea --- /dev/null +++ b/static/graphs/76ec1827-68a1-488f-9899-2b788ea8db64 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=MoonWind" [label="tool\nMoonWind",shape=box,style=filled,color=deepskyblue];"tool=MoonWind" -> "rat=MoonWind" [label="similar",dir="both"];"tool=MoonWind" -> "mitre-enterprise-attack-malware=MoonWind - S0149" [label="similar",dir="both"];"tool=MoonWind" -> "malpedia=MoonWind" [label="similar",dir="both"];"mitre-enterprise-attack-malware=MoonWind - S0149" [label="mitre-enterprise-attack-malware\nMoonWind - S0149",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=MoonWind - S0149" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];"rat=MoonWind" [label="rat\nMoonWind",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/76ec1827-68a1-488f-9899-2b788ea8db64.png b/static/graphs/76ec1827-68a1-488f-9899-2b788ea8db64.png new file mode 100644 index 0000000..985e4be Binary files /dev/null and b/static/graphs/76ec1827-68a1-488f-9899-2b788ea8db64.png differ diff --git a/static/graphs/771706fa-1015-4bcd-9a74-293285fcd051 b/static/graphs/771706fa-1015-4bcd-9a74-293285fcd051 new file mode 100644 index 0000000..2491f0a --- /dev/null +++ b/static/graphs/771706fa-1015-4bcd-9a74-293285fcd051 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/771706fa-1015-4bcd-9a74-293285fcd051.png b/static/graphs/771706fa-1015-4bcd-9a74-293285fcd051.png new file mode 100644 index 0000000..23f28a0 Binary files /dev/null and b/static/graphs/771706fa-1015-4bcd-9a74-293285fcd051.png differ diff --git a/static/graphs/7718e92f-b011-4f88-b822-ae245a1de407 b/static/graphs/7718e92f-b011-4f88-b822-ae245a1de407 new file mode 100644 index 0000000..ee1eb04 --- /dev/null +++ b/static/graphs/7718e92f-b011-4f88-b822-ae245a1de407 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1055" [label="mitre-pre-attack-attack-pattern\nIdentify job postings and needs/gaps - PRE-T1055",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1055" -> "mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1025" [label="related-to",];"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1025" [label="mitre-pre-attack-attack-pattern\nIdentify job postings and needs/gaps - PRE-T1025",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1025" -> "mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1055" [label="related-to",];} diff --git a/static/graphs/7718e92f-b011-4f88-b822-ae245a1de407.png b/static/graphs/7718e92f-b011-4f88-b822-ae245a1de407.png new file mode 100644 index 0000000..f7ef454 Binary files /dev/null and b/static/graphs/7718e92f-b011-4f88-b822-ae245a1de407.png differ diff --git a/static/graphs/776b1849-8d5b-4762-8ba1-cbbaddb4ce3a b/static/graphs/776b1849-8d5b-4762-8ba1-cbbaddb4ce3a new file mode 100644 index 0000000..450e696 --- /dev/null +++ b/static/graphs/776b1849-8d5b-4762-8ba1-cbbaddb4ce3a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Shamoon" [label="tool\nShamoon",shape=box,style=filled,color=deepskyblue];"tool=Shamoon" -> "mitre-enterprise-attack-malware=Shamoon - S0140" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Shamoon - S0140" [label="mitre-enterprise-attack-malware\nShamoon - S0140",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Shamoon - S0140" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];} diff --git a/static/graphs/776b1849-8d5b-4762-8ba1-cbbaddb4ce3a.png b/static/graphs/776b1849-8d5b-4762-8ba1-cbbaddb4ce3a.png new file mode 100644 index 0000000..ac3e2b2 Binary files /dev/null and b/static/graphs/776b1849-8d5b-4762-8ba1-cbbaddb4ce3a.png differ diff --git a/static/graphs/77fd4d73-6b79-4593-82e7-e4a439cc7604 b/static/graphs/77fd4d73-6b79-4593-82e7-e4a439cc7604 new file mode 100644 index 0000000..1609e1c --- /dev/null +++ b/static/graphs/77fd4d73-6b79-4593-82e7-e4a439cc7604 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=LC_LOAD_DYLIB Addition Mitigation - T1161" [label="mitre-enterprise-attack-course-of-action\nLC_LOAD_DYLIB Addition Mitigation - T1161",shape=ellipse];"mitre-enterprise-attack-course-of-action=LC_LOAD_DYLIB Addition Mitigation - T1161" -> "mitre-enterprise-attack-attack-pattern=LC_LOAD_DYLIB Addition - T1161" [label="mitigates",];} diff --git a/static/graphs/77fd4d73-6b79-4593-82e7-e4a439cc7604.png b/static/graphs/77fd4d73-6b79-4593-82e7-e4a439cc7604.png new file mode 100644 index 0000000..4c6ed3a Binary files /dev/null and b/static/graphs/77fd4d73-6b79-4593-82e7-e4a439cc7604.png differ diff --git a/static/graphs/784ff1bc-1483-41fe-a172-4cd9ae25c06b b/static/graphs/784ff1bc-1483-41fe-a172-4cd9ae25c06b new file mode 100644 index 0000000..ed34942 --- /dev/null +++ b/static/graphs/784ff1bc-1483-41fe-a172-4cd9ae25c06b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1024" [label="mitre-pre-attack-attack-pattern\nAcquire OSINT data sets and information - PRE-T1024",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1024" -> "mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" [label="mitre-pre-attack-attack-pattern\nAcquire OSINT data sets and information - PRE-T1043",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" -> "mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1054" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" -> "mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1024" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1054" [label="mitre-pre-attack-attack-pattern\nAcquire OSINT data sets and information - PRE-T1054",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1054" -> "mitre-pre-attack-attack-pattern=Acquire OSINT data sets and information - PRE-T1043" [label="related-to",];} diff --git a/static/graphs/784ff1bc-1483-41fe-a172-4cd9ae25c06b.png b/static/graphs/784ff1bc-1483-41fe-a172-4cd9ae25c06b.png new file mode 100644 index 0000000..5f11cf8 Binary files /dev/null and b/static/graphs/784ff1bc-1483-41fe-a172-4cd9ae25c06b.png differ diff --git a/static/graphs/7860e21e-7514-4a3f-8a9d-56405ccfdb0c b/static/graphs/7860e21e-7514-4a3f-8a9d-56405ccfdb0c new file mode 100644 index 0000000..77bc9d8 --- /dev/null +++ b/static/graphs/7860e21e-7514-4a3f-8a9d-56405ccfdb0c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1053" [label="mitre-pre-attack-attack-pattern\nIdentify supply chains - PRE-T1053",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1053" -> "mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1042" [label="related-to",];"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1042" [label="mitre-pre-attack-attack-pattern\nIdentify supply chains - PRE-T1042",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1042" -> "mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1053" [label="related-to",];} diff --git a/static/graphs/7860e21e-7514-4a3f-8a9d-56405ccfdb0c.png b/static/graphs/7860e21e-7514-4a3f-8a9d-56405ccfdb0c.png new file mode 100644 index 0000000..b384bce Binary files /dev/null and b/static/graphs/7860e21e-7514-4a3f-8a9d-56405ccfdb0c.png differ diff --git a/static/graphs/78e41091-d10d-4001-b202-89612892b6ff b/static/graphs/78e41091-d10d-4001-b202-89612892b6ff new file mode 100644 index 0000000..82d2478 --- /dev/null +++ b/static/graphs/78e41091-d10d-4001-b202-89612892b6ff @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1023" [label="mitre-pre-attack-attack-pattern\nIdentify supply chains - PRE-T1023",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1023" -> "mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1053" [label="related-to",];"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1023" -> "mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1042" [label="related-to",];"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1053" [label="mitre-pre-attack-attack-pattern\nIdentify supply chains - PRE-T1053",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1053" -> "mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1042" [label="related-to",];"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1042" [label="mitre-pre-attack-attack-pattern\nIdentify supply chains - PRE-T1042",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1042" -> "mitre-pre-attack-attack-pattern=Identify supply chains - PRE-T1053" [label="related-to",];} diff --git a/static/graphs/78e41091-d10d-4001-b202-89612892b6ff.png b/static/graphs/78e41091-d10d-4001-b202-89612892b6ff.png new file mode 100644 index 0000000..23e9cdd Binary files /dev/null and b/static/graphs/78e41091-d10d-4001-b202-89612892b6ff.png differ diff --git a/static/graphs/78ef77ac-a570-4fb9-af80-d04c09dff9ab b/static/graphs/78ef77ac-a570-4fb9-af80-d04c09dff9ab new file mode 100644 index 0000000..c3cef34 --- /dev/null +++ b/static/graphs/78ef77ac-a570-4fb9-af80-d04c09dff9ab @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Zyklon" [label="ransomware\nZyklon",shape=box,style=filled,color=deepskyblue];"ransomware=Zyklon" -> "ransomware=GNL Locker" [label="similar",dir="both"];"ransomware=Zyklon" -> "malpedia=Zyklon" [label="similar",dir="both"];"ransomware=GNL Locker" [label="ransomware\nGNL Locker",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/78ef77ac-a570-4fb9-af80-d04c09dff9ab.png b/static/graphs/78ef77ac-a570-4fb9-af80-d04c09dff9ab.png new file mode 100644 index 0000000..28dceee Binary files /dev/null and b/static/graphs/78ef77ac-a570-4fb9-af80-d04c09dff9ab.png differ diff --git a/static/graphs/7914f9c9-3257-464c-b918-3754c4d018af b/static/graphs/7914f9c9-3257-464c-b918-3754c4d018af new file mode 100644 index 0000000..54beca7 --- /dev/null +++ b/static/graphs/7914f9c9-3257-464c-b918-3754c4d018af @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=OMG! Ransomware" [label="ransomware\nOMG! Ransomware",shape=box,style=filled,color=deepskyblue];"ransomware=OMG! Ransomware" -> "malpedia=GPCode" [label="similar",dir="both"];} diff --git a/static/graphs/7914f9c9-3257-464c-b918-3754c4d018af.png b/static/graphs/7914f9c9-3257-464c-b918-3754c4d018af.png new file mode 100644 index 0000000..d8c333a Binary files /dev/null and b/static/graphs/7914f9c9-3257-464c-b918-3754c4d018af.png differ diff --git a/static/graphs/79499993-a8d6-45eb-b343-bf58dea5bdde b/static/graphs/79499993-a8d6-45eb-b343-bf58dea5bdde new file mode 100644 index 0000000..f73c829 --- /dev/null +++ b/static/graphs/79499993-a8d6-45eb-b343-bf58dea5bdde @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Briba - S0204" [label="mitre-enterprise-attack-malware\nBriba - S0204",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Briba - S0204" -> "mitre-enterprise-attack-attack-pattern=New Service - T1050" [label="uses",];} diff --git a/static/graphs/79499993-a8d6-45eb-b343-bf58dea5bdde.png b/static/graphs/79499993-a8d6-45eb-b343-bf58dea5bdde.png new file mode 100644 index 0000000..4245920 Binary files /dev/null and b/static/graphs/79499993-a8d6-45eb-b343-bf58dea5bdde.png differ diff --git a/static/graphs/795c1a92-3a26-453e-b99a-6a566aa94dc6 b/static/graphs/795c1a92-3a26-453e-b99a-6a566aa94dc6 new file mode 100644 index 0000000..31c5a39 --- /dev/null +++ b/static/graphs/795c1a92-3a26-453e-b99a-6a566aa94dc6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party infrastructure services - PRE-T1106" [label="mitre-pre-attack-attack-pattern\nAcquire and/or use 3rd party infrastructure services - PRE-T1106",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party infrastructure services - PRE-T1106" -> "mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party infrastructure services - PRE-T1084" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party infrastructure services - PRE-T1084" [label="mitre-pre-attack-attack-pattern\nAcquire and/or use 3rd party infrastructure services - PRE-T1084",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party infrastructure services - PRE-T1084" -> "mitre-pre-attack-attack-pattern=Acquire and/or use 3rd party infrastructure services - PRE-T1106" [label="related-to",];} diff --git a/static/graphs/795c1a92-3a26-453e-b99a-6a566aa94dc6.png b/static/graphs/795c1a92-3a26-453e-b99a-6a566aa94dc6.png new file mode 100644 index 0000000..f51aaee Binary files /dev/null and b/static/graphs/795c1a92-3a26-453e-b99a-6a566aa94dc6.png differ diff --git a/static/graphs/797312d4-8a84-4daf-9c56-57da4133c322 b/static/graphs/797312d4-8a84-4daf-9c56-57da4133c322 new file mode 100644 index 0000000..5b36bbe --- /dev/null +++ b/static/graphs/797312d4-8a84-4daf-9c56-57da4133c322 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Trusted Relationship Mitigation - T1199" [label="mitre-enterprise-attack-course-of-action\nTrusted Relationship Mitigation - T1199",shape=ellipse];"mitre-enterprise-attack-course-of-action=Trusted Relationship Mitigation - T1199" -> "mitre-enterprise-attack-attack-pattern=Trusted Relationship - T1199" [label="mitigates",];} diff --git a/static/graphs/797312d4-8a84-4daf-9c56-57da4133c322.png b/static/graphs/797312d4-8a84-4daf-9c56-57da4133c322.png new file mode 100644 index 0000000..d8d9c95 Binary files /dev/null and b/static/graphs/797312d4-8a84-4daf-9c56-57da4133c322.png differ diff --git a/static/graphs/7a14d974-f3d9-4e4e-9b7d-980385762908 b/static/graphs/7a14d974-f3d9-4e4e-9b7d-980385762908 new file mode 100644 index 0000000..7b50755 --- /dev/null +++ b/static/graphs/7a14d974-f3d9-4e4e-9b7d-980385762908 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=DLL Side-Loading Mitigation - T1073" [label="mitre-enterprise-attack-course-of-action\nDLL Side-Loading Mitigation - T1073",shape=ellipse];"mitre-enterprise-attack-course-of-action=DLL Side-Loading Mitigation - T1073" -> "mitre-enterprise-attack-attack-pattern=DLL Side-Loading - T1073" [label="mitigates",];} diff --git a/static/graphs/7a14d974-f3d9-4e4e-9b7d-980385762908.png b/static/graphs/7a14d974-f3d9-4e4e-9b7d-980385762908.png new file mode 100644 index 0000000..d0bd3ba Binary files /dev/null and b/static/graphs/7a14d974-f3d9-4e4e-9b7d-980385762908.png differ diff --git a/static/graphs/7a19ecb1-3c65-4de3-a230-993516aed6a6 b/static/graphs/7a19ecb1-3c65-4de3-a230-993516aed6a6 new file mode 100644 index 0000000..2841b27 --- /dev/null +++ b/static/graphs/7a19ecb1-3c65-4de3-a230-993516aed6a6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Turla - G0010" [label="mitre-enterprise-attack-intrusion-set\nTurla - G0010",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Turla - G0010" -> "threat-actor=Turla Group" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Turla - G0010" -> "threat-actor=APT 26" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Turla - G0010" -> "mitre-enterprise-attack-malware=Epic - S0091" [label="uses",];"mitre-enterprise-attack-malware=Epic - S0091" [label="mitre-enterprise-attack-malware\nEpic - S0091",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Epic - S0091" -> "tool=Wipbot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Epic - S0091" -> "malpedia=Wipbot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Epic - S0091" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"threat-actor=Turla Group" [label="threat-actor\nTurla Group",shape=octagon,style=filled,color=indianred1];"threat-actor=APT 26" [label="threat-actor\nAPT 26",shape=octagon,style=filled,color=indianred1];"tool=Wipbot" [label="tool\nWipbot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/7a19ecb1-3c65-4de3-a230-993516aed6a6.png b/static/graphs/7a19ecb1-3c65-4de3-a230-993516aed6a6.png new file mode 100644 index 0000000..0c6d34e Binary files /dev/null and b/static/graphs/7a19ecb1-3c65-4de3-a230-993516aed6a6.png differ diff --git a/static/graphs/7a4d0054-53cd-476f-88af-955dddc80ee0 b/static/graphs/7a4d0054-53cd-476f-88af-955dddc80ee0 new file mode 100644 index 0000000..d9a21bd --- /dev/null +++ b/static/graphs/7a4d0054-53cd-476f-88af-955dddc80ee0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Drive-by Compromise Mitigation - T1189" [label="mitre-enterprise-attack-course-of-action\nDrive-by Compromise Mitigation - T1189",shape=ellipse];"mitre-enterprise-attack-course-of-action=Drive-by Compromise Mitigation - T1189" -> "mitre-enterprise-attack-attack-pattern=Drive-by Compromise - T1189" [label="mitigates",];} diff --git a/static/graphs/7a4d0054-53cd-476f-88af-955dddc80ee0.png b/static/graphs/7a4d0054-53cd-476f-88af-955dddc80ee0.png new file mode 100644 index 0000000..e16f8e3 Binary files /dev/null and b/static/graphs/7a4d0054-53cd-476f-88af-955dddc80ee0.png differ diff --git a/static/graphs/7a6e5ca3-562f-4185-a323-f3b62b5b2e6b b/static/graphs/7a6e5ca3-562f-4185-a323-f3b62b5b2e6b new file mode 100644 index 0000000..ac80b7d --- /dev/null +++ b/static/graphs/7a6e5ca3-562f-4185-a323-f3b62b5b2e6b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=LSASS Driver Mitigation - T1177" [label="mitre-enterprise-attack-course-of-action\nLSASS Driver Mitigation - T1177",shape=ellipse];"mitre-enterprise-attack-course-of-action=LSASS Driver Mitigation - T1177" -> "mitre-enterprise-attack-attack-pattern=LSASS Driver - T1177" [label="mitigates",];} diff --git a/static/graphs/7a6e5ca3-562f-4185-a323-f3b62b5b2e6b.png b/static/graphs/7a6e5ca3-562f-4185-a323-f3b62b5b2e6b.png new file mode 100644 index 0000000..de7eb23 Binary files /dev/null and b/static/graphs/7a6e5ca3-562f-4185-a323-f3b62b5b2e6b.png differ diff --git a/static/graphs/7a6fcec7-3408-4371-907b-cbf8fc931b66 b/static/graphs/7a6fcec7-3408-4371-907b-cbf8fc931b66 new file mode 100644 index 0000000..c31be99 --- /dev/null +++ b/static/graphs/7a6fcec7-3408-4371-907b-cbf8fc931b66 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Madmax" [label="botnet\nMadmax",shape=box,style=filled,color=deepskyblue];"botnet=Madmax" -> "tool=Mad Max" [label="similar",dir="both"];"tool=Mad Max" [label="tool\nMad Max",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/7a6fcec7-3408-4371-907b-cbf8fc931b66.png b/static/graphs/7a6fcec7-3408-4371-907b-cbf8fc931b66.png new file mode 100644 index 0000000..dd41c98 Binary files /dev/null and b/static/graphs/7a6fcec7-3408-4371-907b-cbf8fc931b66.png differ diff --git a/static/graphs/7abd6950-7a07-4d9e-ade1-62414fa50619 b/static/graphs/7abd6950-7a07-4d9e-ade1-62414fa50619 new file mode 100644 index 0000000..7454308 --- /dev/null +++ b/static/graphs/7abd6950-7a07-4d9e-ade1-62414fa50619 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=NanHaiShu" [label="tool\nNanHaiShu",shape=box,style=filled,color=deepskyblue];"tool=NanHaiShu" -> "mitre-enterprise-attack-malware=NanHaiShu - S0228" [label="similar",dir="both"];"mitre-enterprise-attack-malware=NanHaiShu - S0228" [label="mitre-enterprise-attack-malware\nNanHaiShu - S0228",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=NanHaiShu - S0228" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];} diff --git a/static/graphs/7abd6950-7a07-4d9e-ade1-62414fa50619.png b/static/graphs/7abd6950-7a07-4d9e-ade1-62414fa50619.png new file mode 100644 index 0000000..0c9f7f4 Binary files /dev/null and b/static/graphs/7abd6950-7a07-4d9e-ade1-62414fa50619.png differ diff --git a/static/graphs/7aee8ea0-0baa-4232-b379-5d9ce98352cf b/static/graphs/7aee8ea0-0baa-4232-b379-5d9ce98352cf new file mode 100644 index 0000000..5b2b03e --- /dev/null +++ b/static/graphs/7aee8ea0-0baa-4232-b379-5d9ce98352cf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Hooking Mitigation - T1179" [label="mitre-enterprise-attack-course-of-action\nHooking Mitigation - T1179",shape=ellipse];"mitre-enterprise-attack-course-of-action=Hooking Mitigation - T1179" -> "mitre-enterprise-attack-attack-pattern=Hooking - T1179" [label="mitigates",];} diff --git a/static/graphs/7aee8ea0-0baa-4232-b379-5d9ce98352cf.png b/static/graphs/7aee8ea0-0baa-4232-b379-5d9ce98352cf.png new file mode 100644 index 0000000..b535709 Binary files /dev/null and b/static/graphs/7aee8ea0-0baa-4232-b379-5d9ce98352cf.png differ diff --git a/static/graphs/7b1cf46f-784b-405a-a8dd-4624c19d8321 b/static/graphs/7b1cf46f-784b-405a-a8dd-4624c19d8321 new file mode 100644 index 0000000..72936de --- /dev/null +++ b/static/graphs/7b1cf46f-784b-405a-a8dd-4624c19d8321 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=System Partition Integrity - MOB-M1004" [label="mitre-mobile-attack-course-of-action\nSystem Partition Integrity - MOB-M1004",shape=ellipse];"mitre-mobile-attack-course-of-action=System Partition Integrity - MOB-M1004" -> "mitre-mobile-attack-attack-pattern=Modify System Partition - MOB-T1003" [label="mitigates",];} diff --git a/static/graphs/7b1cf46f-784b-405a-a8dd-4624c19d8321.png b/static/graphs/7b1cf46f-784b-405a-a8dd-4624c19d8321.png new file mode 100644 index 0000000..0b3930a Binary files /dev/null and b/static/graphs/7b1cf46f-784b-405a-a8dd-4624c19d8321.png differ diff --git a/static/graphs/7baccb84-356c-4e89-8c5d-58e701f033fc b/static/graphs/7baccb84-356c-4e89-8c5d-58e701f033fc new file mode 100644 index 0000000..496d7f0 --- /dev/null +++ b/static/graphs/7baccb84-356c-4e89-8c5d-58e701f033fc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1077" [label="mitre-pre-attack-attack-pattern\nAnalyze organizational skillsets and deficiencies - PRE-T1077",shape=ellipse];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1077" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" [label="related-to",];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" [label="mitre-pre-attack-attack-pattern\nAnalyze organizational skillsets and deficiencies - PRE-T1074",shape=ellipse];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1066" [label="related-to",];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1077" [label="related-to",];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1066" [label="mitre-pre-attack-attack-pattern\nAnalyze organizational skillsets and deficiencies - PRE-T1066",shape=ellipse];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1066" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" [label="related-to",];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1066" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1077" [label="related-to",];} diff --git a/static/graphs/7baccb84-356c-4e89-8c5d-58e701f033fc.png b/static/graphs/7baccb84-356c-4e89-8c5d-58e701f033fc.png new file mode 100644 index 0000000..e570f42 Binary files /dev/null and b/static/graphs/7baccb84-356c-4e89-8c5d-58e701f033fc.png differ diff --git a/static/graphs/7bec698a-7e20-4fd3-bb6a-12787770fb1a b/static/graphs/7bec698a-7e20-4fd3-bb6a-12787770fb1a new file mode 100644 index 0000000..1e98429 --- /dev/null +++ b/static/graphs/7bec698a-7e20-4fd3-bb6a-12787770fb1a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=3PARA RAT - S0066" [label="mitre-enterprise-attack-malware\n3PARA RAT - S0066",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=3PARA RAT - S0066" -> "rat=3PARA RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=3PARA RAT - S0066" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];"rat=3PARA RAT" [label="rat\n3PARA RAT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/7bec698a-7e20-4fd3-bb6a-12787770fb1a.png b/static/graphs/7bec698a-7e20-4fd3-bb6a-12787770fb1a.png new file mode 100644 index 0000000..2ff3505 Binary files /dev/null and b/static/graphs/7bec698a-7e20-4fd3-bb6a-12787770fb1a.png differ diff --git a/static/graphs/7c1796c7-9fc3-4c3e-9416-527295bf5d95 b/static/graphs/7c1796c7-9fc3-4c3e-9416-527295bf5d95 new file mode 100644 index 0000000..dbaff6c --- /dev/null +++ b/static/graphs/7c1796c7-9fc3-4c3e-9416-527295bf5d95 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Commonly Used Port Mitigation - T1043" [label="mitre-enterprise-attack-course-of-action\nCommonly Used Port Mitigation - T1043",shape=ellipse];"mitre-enterprise-attack-course-of-action=Commonly Used Port Mitigation - T1043" -> "mitre-enterprise-attack-attack-pattern=Commonly Used Port - T1043" [label="mitigates",];} diff --git a/static/graphs/7c1796c7-9fc3-4c3e-9416-527295bf5d95.png b/static/graphs/7c1796c7-9fc3-4c3e-9416-527295bf5d95.png new file mode 100644 index 0000000..0e977be Binary files /dev/null and b/static/graphs/7c1796c7-9fc3-4c3e-9416-527295bf5d95.png differ diff --git a/static/graphs/7c39ebbf-244e-4d1c-b0ac-b282453ece43 b/static/graphs/7c39ebbf-244e-4d1c-b0ac-b282453ece43 new file mode 100644 index 0000000..0481003 --- /dev/null +++ b/static/graphs/7c39ebbf-244e-4d1c-b0ac-b282453ece43 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Process Hollowing Mitigation - T1093" [label="mitre-enterprise-attack-course-of-action\nProcess Hollowing Mitigation - T1093",shape=ellipse];"mitre-enterprise-attack-course-of-action=Process Hollowing Mitigation - T1093" -> "mitre-enterprise-attack-attack-pattern=Process Hollowing - T1093" [label="mitigates",];} diff --git a/static/graphs/7c39ebbf-244e-4d1c-b0ac-b282453ece43.png b/static/graphs/7c39ebbf-244e-4d1c-b0ac-b282453ece43.png new file mode 100644 index 0000000..5ea2479 Binary files /dev/null and b/static/graphs/7c39ebbf-244e-4d1c-b0ac-b282453ece43.png differ diff --git a/static/graphs/7c5a1e93-7ab2-4b08-ada9-e82c4feaed0a b/static/graphs/7c5a1e93-7ab2-4b08-ada9-e82c4feaed0a new file mode 100644 index 0000000..c82616b --- /dev/null +++ b/static/graphs/7c5a1e93-7ab2-4b08-ada9-e82c4feaed0a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Petya" [label="ransomware\nPetya",shape=box,style=filled,color=deepskyblue];"ransomware=Petya" -> "malpedia=Petya" [label="similar",dir="both"];"ransomware=Petya" -> "ransomware=GoldenEye Ransomware" [label="similar",dir="both"];"ransomware=GoldenEye Ransomware" [label="ransomware\nGoldenEye Ransomware",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/7c5a1e93-7ab2-4b08-ada9-e82c4feaed0a.png b/static/graphs/7c5a1e93-7ab2-4b08-ada9-e82c4feaed0a.png new file mode 100644 index 0000000..d0c7588 Binary files /dev/null and b/static/graphs/7c5a1e93-7ab2-4b08-ada9-e82c4feaed0a.png differ diff --git a/static/graphs/7ca93488-c357-44c3-b246-3f88391aca5a b/static/graphs/7ca93488-c357-44c3-b246-3f88391aca5a new file mode 100644 index 0000000..4144c7f --- /dev/null +++ b/static/graphs/7ca93488-c357-44c3-b246-3f88391aca5a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Feodo" [label="banker\nFeodo",shape=box,style=filled,color=deepskyblue];"banker=Feodo" -> "tool=Dridex" [label="similar",dir="both"];"banker=Feodo" -> "malpedia=Feodo" [label="similar",dir="both"];"tool=Dridex" [label="tool\nDridex",shape=box,style=filled,color=deepskyblue];"tool=Dridex" -> "banker=Dridex" [label="similar",dir="both"];"tool=Dridex" -> "malpedia=Dridex" [label="similar",dir="both"];"banker=Dridex" [label="banker\nDridex",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/7ca93488-c357-44c3-b246-3f88391aca5a.png b/static/graphs/7ca93488-c357-44c3-b246-3f88391aca5a.png new file mode 100644 index 0000000..f97af8b Binary files /dev/null and b/static/graphs/7ca93488-c357-44c3-b246-3f88391aca5a.png differ diff --git a/static/graphs/7ccd3821-e825-4ff8-b4be-92c9732ce708 b/static/graphs/7ccd3821-e825-4ff8-b4be-92c9732ce708 new file mode 100644 index 0000000..89f9ff9 --- /dev/null +++ b/static/graphs/7ccd3821-e825-4ff8-b4be-92c9732ce708 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Trojan.Laziok" [label="tool\nTrojan.Laziok",shape=box,style=filled,color=deepskyblue];"tool=Trojan.Laziok" -> "malpedia=Laziok" [label="similar",dir="both"];} diff --git a/static/graphs/7ccd3821-e825-4ff8-b4be-92c9732ce708.png b/static/graphs/7ccd3821-e825-4ff8-b4be-92c9732ce708.png new file mode 100644 index 0000000..10730b9 Binary files /dev/null and b/static/graphs/7ccd3821-e825-4ff8-b4be-92c9732ce708.png differ diff --git a/static/graphs/7d9362e5-e3cf-4640-88a2-3faf31952963 b/static/graphs/7d9362e5-e3cf-4640-88a2-3faf31952963 new file mode 100644 index 0000000..eda69a3 --- /dev/null +++ b/static/graphs/7d9362e5-e3cf-4640-88a2-3faf31952963 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=GratefulPOS" [label="banker\nGratefulPOS",shape=box,style=filled,color=deepskyblue];"banker=GratefulPOS" -> "tool=GratefulPOS" [label="similar",dir="both"];"tool=GratefulPOS" [label="tool\nGratefulPOS",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/7d9362e5-e3cf-4640-88a2-3faf31952963.png b/static/graphs/7d9362e5-e3cf-4640-88a2-3faf31952963.png new file mode 100644 index 0000000..24837cb Binary files /dev/null and b/static/graphs/7d9362e5-e3cf-4640-88a2-3faf31952963.png differ diff --git a/static/graphs/7dbb67c7-270a-40ad-836e-c45f8948aa5a b/static/graphs/7dbb67c7-270a-40ad-836e-c45f8948aa5a new file mode 100644 index 0000000..0fa9ed4 --- /dev/null +++ b/static/graphs/7dbb67c7-270a-40ad-836e-c45f8948aa5a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=KOMPROGO - S0156" [label="mitre-enterprise-attack-malware\nKOMPROGO - S0156",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=KOMPROGO - S0156" -> "mitre-enterprise-attack-attack-pattern=Windows Management Instrumentation - T1047" [label="uses",];} diff --git a/static/graphs/7dbb67c7-270a-40ad-836e-c45f8948aa5a.png b/static/graphs/7dbb67c7-270a-40ad-836e-c45f8948aa5a.png new file mode 100644 index 0000000..d5b7d8a Binary files /dev/null and b/static/graphs/7dbb67c7-270a-40ad-836e-c45f8948aa5a.png differ diff --git a/static/graphs/7e2288ec-e7d4-4833-9245-a2bc5ae40ee2 b/static/graphs/7e2288ec-e7d4-4833-9245-a2bc5ae40ee2 new file mode 100644 index 0000000..e143534 --- /dev/null +++ b/static/graphs/7e2288ec-e7d4-4833-9245-a2bc5ae40ee2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Ramnit" [label="banker\nRamnit",shape=box,style=filled,color=deepskyblue];"banker=Ramnit" -> "botnet=Ramnit" [label="similar",dir="both"];"banker=Ramnit" -> "malpedia=Ramnit" [label="similar",dir="both"];"botnet=Ramnit" [label="botnet\nRamnit",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/7e2288ec-e7d4-4833-9245-a2bc5ae40ee2.png b/static/graphs/7e2288ec-e7d4-4833-9245-a2bc5ae40ee2.png new file mode 100644 index 0000000..8b05988 Binary files /dev/null and b/static/graphs/7e2288ec-e7d4-4833-9245-a2bc5ae40ee2.png differ diff --git a/static/graphs/7ecc3b4f-5cdb-457e-b55a-df376b359446 b/static/graphs/7ecc3b4f-5cdb-457e-b55a-df376b359446 new file mode 100644 index 0000000..89c3c96 --- /dev/null +++ b/static/graphs/7ecc3b4f-5cdb-457e-b55a-df376b359446 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Poseidon Group - G0033" [label="mitre-enterprise-attack-intrusion-set\nPoseidon Group - G0033",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Poseidon Group - G0033" -> "threat-actor=Poseidon Group" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Poseidon Group - G0033" -> "mitre-enterprise-attack-attack-pattern=System Service Discovery - T1007" [label="uses",];"threat-actor=Poseidon Group" [label="threat-actor\nPoseidon Group",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/7ecc3b4f-5cdb-457e-b55a-df376b359446.png b/static/graphs/7ecc3b4f-5cdb-457e-b55a-df376b359446.png new file mode 100644 index 0000000..b6c4ccd Binary files /dev/null and b/static/graphs/7ecc3b4f-5cdb-457e-b55a-df376b359446.png differ diff --git a/static/graphs/7ee0879d-ce4f-4f54-a96b-c532dfb98ffd b/static/graphs/7ee0879d-ce4f-4f54-a96b-c532dfb98ffd new file mode 100644 index 0000000..1fc11fa --- /dev/null +++ b/static/graphs/7ee0879d-ce4f-4f54-a96b-c532dfb98ffd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Data from Local System Mitigation - T1005" [label="mitre-enterprise-attack-course-of-action\nData from Local System Mitigation - T1005",shape=ellipse];"mitre-enterprise-attack-course-of-action=Data from Local System Mitigation - T1005" -> "mitre-enterprise-attack-attack-pattern=Data from Local System - T1005" [label="mitigates",];} diff --git a/static/graphs/7ee0879d-ce4f-4f54-a96b-c532dfb98ffd.png b/static/graphs/7ee0879d-ce4f-4f54-a96b-c532dfb98ffd.png new file mode 100644 index 0000000..6b6da6f Binary files /dev/null and b/static/graphs/7ee0879d-ce4f-4f54-a96b-c532dfb98ffd.png differ diff --git a/static/graphs/7f3a035d-d83a-45b8-8111-412aa8ade802 b/static/graphs/7f3a035d-d83a-45b8-8111-412aa8ade802 new file mode 100644 index 0000000..58d1dda --- /dev/null +++ b/static/graphs/7f3a035d-d83a-45b8-8111-412aa8ade802 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Mimikatz" [label="tool\nMimikatz",shape=box,style=filled,color=deepskyblue];"tool=Mimikatz" -> "mitre-enterprise-attack-tool=Mimikatz - S0002" [label="similar",dir="both"];"mitre-enterprise-attack-tool=Mimikatz - S0002" [label="mitre-enterprise-attack-tool\nMimikatz - S0002",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Mimikatz - S0002" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];} diff --git a/static/graphs/7f3a035d-d83a-45b8-8111-412aa8ade802.png b/static/graphs/7f3a035d-d83a-45b8-8111-412aa8ade802.png new file mode 100644 index 0000000..2040beb Binary files /dev/null and b/static/graphs/7f3a035d-d83a-45b8-8111-412aa8ade802.png differ diff --git a/static/graphs/7f8730af-f683-423f-9ee1-5f6875a80481 b/static/graphs/7f8730af-f683-423f-9ee1-5f6875a80481 new file mode 100644 index 0000000..c1c6a8a --- /dev/null +++ b/static/graphs/7f8730af-f683-423f-9ee1-5f6875a80481 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Sys10 - S0060" [label="mitre-enterprise-attack-malware\nSys10 - S0060",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Sys10 - S0060" -> "malpedia=Sys10" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Sys10 - S0060" -> "mitre-enterprise-attack-attack-pattern=Custom Cryptographic Protocol - T1024" [label="uses",];} diff --git a/static/graphs/7f8730af-f683-423f-9ee1-5f6875a80481.png b/static/graphs/7f8730af-f683-423f-9ee1-5f6875a80481.png new file mode 100644 index 0000000..61f2739 Binary files /dev/null and b/static/graphs/7f8730af-f683-423f-9ee1-5f6875a80481.png differ diff --git a/static/graphs/7fb493bb-756b-42a2-8f6d-59e254f4f2cc b/static/graphs/7fb493bb-756b-42a2-8f6d-59e254f4f2cc new file mode 100644 index 0000000..71b62fe --- /dev/null +++ b/static/graphs/7fb493bb-756b-42a2-8f6d-59e254f4f2cc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=NJRat" [label="rat\nNJRat",shape=box,style=filled,color=deepskyblue];"rat=NJRat" -> "rat=Kiler RAT" [label="similar",dir="both"];"rat=Kiler RAT" [label="rat\nKiler RAT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/7fb493bb-756b-42a2-8f6d-59e254f4f2cc.png b/static/graphs/7fb493bb-756b-42a2-8f6d-59e254f4f2cc.png new file mode 100644 index 0000000..d76a5bd Binary files /dev/null and b/static/graphs/7fb493bb-756b-42a2-8f6d-59e254f4f2cc.png differ diff --git a/static/graphs/7fcbc4e8-1989-441f-9ac5-e7b6ff5806f1 b/static/graphs/7fcbc4e8-1989-441f-9ac5-e7b6ff5806f1 new file mode 100644 index 0000000..4bad358 --- /dev/null +++ b/static/graphs/7fcbc4e8-1989-441f-9ac5-e7b6ff5806f1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Systeminfo - S0096" [label="mitre-enterprise-attack-tool\nSysteminfo - S0096",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Systeminfo - S0096" -> "mitre-enterprise-attack-attack-pattern=System Information Discovery - T1082" [label="uses",];} diff --git a/static/graphs/7fcbc4e8-1989-441f-9ac5-e7b6ff5806f1.png b/static/graphs/7fcbc4e8-1989-441f-9ac5-e7b6ff5806f1.png new file mode 100644 index 0000000..eeed0f8 Binary files /dev/null and b/static/graphs/7fcbc4e8-1989-441f-9ac5-e7b6ff5806f1.png differ diff --git a/static/graphs/800bdfba-6d66-480f-9f45-15845c05cb5d b/static/graphs/800bdfba-6d66-480f-9f45-15845c05cb5d new file mode 100644 index 0000000..9a364c4 --- /dev/null +++ b/static/graphs/800bdfba-6d66-480f-9f45-15845c05cb5d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=pngdowner - S0067" [label="mitre-enterprise-attack-malware\npngdowner - S0067",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=pngdowner - S0067" -> "malpedia=pngdowner" [label="similar",dir="both"];"mitre-enterprise-attack-malware=pngdowner - S0067" -> "mitre-enterprise-attack-attack-pattern=Credentials in Files - T1081" [label="uses",];} diff --git a/static/graphs/800bdfba-6d66-480f-9f45-15845c05cb5d.png b/static/graphs/800bdfba-6d66-480f-9f45-15845c05cb5d.png new file mode 100644 index 0000000..e8fa1b7 Binary files /dev/null and b/static/graphs/800bdfba-6d66-480f-9f45-15845c05cb5d.png differ diff --git a/static/graphs/80365d3a-6d46-4195-a772-364749a6dc06 b/static/graphs/80365d3a-6d46-4195-a772-364749a6dc06 new file mode 100644 index 0000000..8bc8220 --- /dev/null +++ b/static/graphs/80365d3a-6d46-4195-a772-364749a6dc06 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=SunOrcal" [label="tool\nSunOrcal",shape=box,style=filled,color=deepskyblue];"tool=SunOrcal" -> "tool=Reaver" [label="similar",dir="both"];"tool=SunOrcal" -> "tool=SURTR" [label="similar",dir="both"];"tool=Reaver" [label="tool\nReaver",shape=box,style=filled,color=deepskyblue];"tool=SURTR" [label="tool\nSURTR",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/80365d3a-6d46-4195-a772-364749a6dc06.png b/static/graphs/80365d3a-6d46-4195-a772-364749a6dc06.png new file mode 100644 index 0000000..4f46180 Binary files /dev/null and b/static/graphs/80365d3a-6d46-4195-a772-364749a6dc06.png differ diff --git a/static/graphs/809b54c3-dd6a-4ec9-8c3a-a27b9baa6732 b/static/graphs/809b54c3-dd6a-4ec9-8c3a-a27b9baa6732 new file mode 100644 index 0000000..5f30d55 --- /dev/null +++ b/static/graphs/809b54c3-dd6a-4ec9-8c3a-a27b9baa6732 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Duqu" [label="tool\nDuqu",shape=box,style=filled,color=deepskyblue];"tool=Duqu" -> "mitre-enterprise-attack-malware=Duqu - S0038" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Duqu - S0038" [label="mitre-enterprise-attack-malware\nDuqu - S0038",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Duqu - S0038" -> "mitre-enterprise-attack-attack-pattern=Process Hollowing - T1093" [label="uses",];} diff --git a/static/graphs/809b54c3-dd6a-4ec9-8c3a-a27b9baa6732.png b/static/graphs/809b54c3-dd6a-4ec9-8c3a-a27b9baa6732.png new file mode 100644 index 0000000..ba64e8b Binary files /dev/null and b/static/graphs/809b54c3-dd6a-4ec9-8c3a-a27b9baa6732.png differ diff --git a/static/graphs/809b79cd-be78-4597-88d1-5496d1d9993a b/static/graphs/809b79cd-be78-4597-88d1-5496d1d9993a new file mode 100644 index 0000000..880e0a7 --- /dev/null +++ b/static/graphs/809b79cd-be78-4597-88d1-5496d1d9993a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Trap Mitigation - T1154" [label="mitre-enterprise-attack-course-of-action\nTrap Mitigation - T1154",shape=ellipse];"mitre-enterprise-attack-course-of-action=Trap Mitigation - T1154" -> "mitre-enterprise-attack-attack-pattern=Trap - T1154" [label="mitigates",];} diff --git a/static/graphs/809b79cd-be78-4597-88d1-5496d1d9993a.png b/static/graphs/809b79cd-be78-4597-88d1-5496d1d9993a.png new file mode 100644 index 0000000..516f88e Binary files /dev/null and b/static/graphs/809b79cd-be78-4597-88d1-5496d1d9993a.png differ diff --git a/static/graphs/80a014ba-3fef-4768-990b-37d8bd10d7f4 b/static/graphs/80a014ba-3fef-4768-990b-37d8bd10d7f4 new file mode 100644 index 0000000..aae3595 --- /dev/null +++ b/static/graphs/80a014ba-3fef-4768-990b-37d8bd10d7f4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Uroburos - S0022" [label="mitre-enterprise-attack-malware\nUroburos - S0022",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Uroburos - S0022" -> "tool=Turla" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Uroburos - S0022" -> "malpedia=Uroburos (Windows)" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Uroburos - S0022" -> "mitre-enterprise-attack-attack-pattern=Software Packing - T1045" [label="uses",];"tool=Turla" [label="tool\nTurla",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/80a014ba-3fef-4768-990b-37d8bd10d7f4.png b/static/graphs/80a014ba-3fef-4768-990b-37d8bd10d7f4.png new file mode 100644 index 0000000..868e909 Binary files /dev/null and b/static/graphs/80a014ba-3fef-4768-990b-37d8bd10d7f4.png differ diff --git a/static/graphs/80c91478-ac87-434f-bee7-11f37aec4d74 b/static/graphs/80c91478-ac87-434f-bee7-11f37aec4d74 new file mode 100644 index 0000000..ef7bad4 --- /dev/null +++ b/static/graphs/80c91478-ac87-434f-bee7-11f37aec4d74 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Dynamic Data Exchange Mitigation - T1173" [label="mitre-enterprise-attack-course-of-action\nDynamic Data Exchange Mitigation - T1173",shape=ellipse];"mitre-enterprise-attack-course-of-action=Dynamic Data Exchange Mitigation - T1173" -> "mitre-enterprise-attack-attack-pattern=Dynamic Data Exchange - T1173" [label="mitigates",];} diff --git a/static/graphs/80c91478-ac87-434f-bee7-11f37aec4d74.png b/static/graphs/80c91478-ac87-434f-bee7-11f37aec4d74.png new file mode 100644 index 0000000..13c9791 Binary files /dev/null and b/static/graphs/80c91478-ac87-434f-bee7-11f37aec4d74.png differ diff --git a/static/graphs/811bdec0-e236-48ae-b27c-1a8fe0bfc3a9 b/static/graphs/811bdec0-e236-48ae-b27c-1a8fe0bfc3a9 new file mode 100644 index 0000000..fbcb34f --- /dev/null +++ b/static/graphs/811bdec0-e236-48ae-b27c-1a8fe0bfc3a9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Winexe" [label="tool\nWinexe",shape=box,style=filled,color=deepskyblue];"tool=Winexe" -> "mitre-enterprise-attack-tool=Winexe - S0191" [label="similar",dir="both"];"mitre-enterprise-attack-tool=Winexe - S0191" [label="mitre-enterprise-attack-tool\nWinexe - S0191",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Winexe - S0191" -> "mitre-enterprise-attack-attack-pattern=Service Execution - T1035" [label="uses",];} diff --git a/static/graphs/811bdec0-e236-48ae-b27c-1a8fe0bfc3a9.png b/static/graphs/811bdec0-e236-48ae-b27c-1a8fe0bfc3a9.png new file mode 100644 index 0000000..0ab21b1 Binary files /dev/null and b/static/graphs/811bdec0-e236-48ae-b27c-1a8fe0bfc3a9.png differ diff --git a/static/graphs/81f41bae-2ba9-4cec-9613-776be71645ca b/static/graphs/81f41bae-2ba9-4cec-9613-776be71645ca new file mode 100644 index 0000000..6d6542b --- /dev/null +++ b/static/graphs/81f41bae-2ba9-4cec-9613-776be71645ca @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Smoke Loader" [label="tool\nSmoke Loader",shape=box,style=filled,color=deepskyblue];"tool=Smoke Loader" -> "mitre-enterprise-attack-malware=Smoke Loader - S0226" [label="similar",dir="both"];"tool=Smoke Loader" -> "malpedia=SmokeLoader" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Smoke Loader - S0226" [label="mitre-enterprise-attack-malware\nSmoke Loader - S0226",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Smoke Loader - S0226" -> "mitre-enterprise-attack-attack-pattern=Supply Chain Compromise - T1195" [label="uses",];} diff --git a/static/graphs/81f41bae-2ba9-4cec-9613-776be71645ca.png b/static/graphs/81f41bae-2ba9-4cec-9613-776be71645ca.png new file mode 100644 index 0000000..1fa5364 Binary files /dev/null and b/static/graphs/81f41bae-2ba9-4cec-9613-776be71645ca.png differ diff --git a/static/graphs/81faf0c1-0595-436b-a66a-05d8b435bccd b/static/graphs/81faf0c1-0595-436b-a66a-05d8b435bccd new file mode 100644 index 0000000..431ef29 --- /dev/null +++ b/static/graphs/81faf0c1-0595-436b-a66a-05d8b435bccd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Bateleur" [label="tool\nBateleur",shape=box,style=filled,color=deepskyblue];"tool=Bateleur" -> "malpedia=Bateleur" [label="similar",dir="both"];} diff --git a/static/graphs/81faf0c1-0595-436b-a66a-05d8b435bccd.png b/static/graphs/81faf0c1-0595-436b-a66a-05d8b435bccd.png new file mode 100644 index 0000000..53f27ff Binary files /dev/null and b/static/graphs/81faf0c1-0595-436b-a66a-05d8b435bccd.png differ diff --git a/static/graphs/8204723f-aefc-4c90-9178-8fe53e8d6f33 b/static/graphs/8204723f-aefc-4c90-9178-8fe53e8d6f33 new file mode 100644 index 0000000..9c3f520 --- /dev/null +++ b/static/graphs/8204723f-aefc-4c90-9178-8fe53e8d6f33 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Trochilus" [label="rat\nTrochilus",shape=box,style=filled,color=deepskyblue];"rat=Trochilus" -> "tool=Trochilus" [label="similar",dir="both"];"tool=Trochilus" [label="tool\nTrochilus",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8204723f-aefc-4c90-9178-8fe53e8d6f33.png b/static/graphs/8204723f-aefc-4c90-9178-8fe53e8d6f33.png new file mode 100644 index 0000000..afff413 Binary files /dev/null and b/static/graphs/8204723f-aefc-4c90-9178-8fe53e8d6f33.png differ diff --git a/static/graphs/8220b57e-c400-4525-bf69-f8edc6b389a8 b/static/graphs/8220b57e-c400-4525-bf69-f8edc6b389a8 new file mode 100644 index 0000000..3683f80 --- /dev/null +++ b/static/graphs/8220b57e-c400-4525-bf69-f8edc6b389a8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=Encrypt Network Traffic - MOB-M1009" [label="mitre-mobile-attack-course-of-action\nEncrypt Network Traffic - MOB-M1009",shape=ellipse];"mitre-mobile-attack-course-of-action=Encrypt Network Traffic - MOB-M1009" -> "mitre-mobile-attack-attack-pattern=Eavesdrop on Insecure Network Communication - MOB-T1042" [label="mitigates",];"mitre-mobile-attack-course-of-action=Encrypt Network Traffic - MOB-M1009" -> "mitre-mobile-attack-attack-pattern=Rogue Cellular Base Station - MOB-T1070" [label="mitigates",];} diff --git a/static/graphs/8220b57e-c400-4525-bf69-f8edc6b389a8.png b/static/graphs/8220b57e-c400-4525-bf69-f8edc6b389a8.png new file mode 100644 index 0000000..9ce8c15 Binary files /dev/null and b/static/graphs/8220b57e-c400-4525-bf69-f8edc6b389a8.png differ diff --git a/static/graphs/823fbfe9-b015-4bf3-9e67-d340c7373ca0 b/static/graphs/823fbfe9-b015-4bf3-9e67-d340c7373ca0 new file mode 100644 index 0000000..663875d --- /dev/null +++ b/static/graphs/823fbfe9-b015-4bf3-9e67-d340c7373ca0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Trusted Developer Utilities Mitigation - T1127" [label="mitre-enterprise-attack-course-of-action\nTrusted Developer Utilities Mitigation - T1127",shape=ellipse];"mitre-enterprise-attack-course-of-action=Trusted Developer Utilities Mitigation - T1127" -> "mitre-enterprise-attack-attack-pattern=Trusted Developer Utilities - T1127" [label="mitigates",];} diff --git a/static/graphs/823fbfe9-b015-4bf3-9e67-d340c7373ca0.png b/static/graphs/823fbfe9-b015-4bf3-9e67-d340c7373ca0.png new file mode 100644 index 0000000..96395f3 Binary files /dev/null and b/static/graphs/823fbfe9-b015-4bf3-9e67-d340c7373ca0.png differ diff --git a/static/graphs/82c1c7fa-c67b-4be6-9be8-8aa400ef2445 b/static/graphs/82c1c7fa-c67b-4be6-9be8-8aa400ef2445 new file mode 100644 index 0000000..f90c3d5 --- /dev/null +++ b/static/graphs/82c1c7fa-c67b-4be6-9be8-8aa400ef2445 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=TeamSpy Crew" [label="threat-actor\nTeamSpy Crew",shape=octagon,style=filled,color=indianred1];"threat-actor=TeamSpy Crew" -> "threat-actor=Berserk Bear" [label="similar",dir="both"];"threat-actor=Berserk Bear" [label="threat-actor\nBerserk Bear",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/82c1c7fa-c67b-4be6-9be8-8aa400ef2445.png b/static/graphs/82c1c7fa-c67b-4be6-9be8-8aa400ef2445.png new file mode 100644 index 0000000..154eadd Binary files /dev/null and b/static/graphs/82c1c7fa-c67b-4be6-9be8-8aa400ef2445.png differ diff --git a/static/graphs/82cb34ba-02b5-432b-b2d2-07f55cbf674d b/static/graphs/82cb34ba-02b5-432b-b2d2-07f55cbf674d new file mode 100644 index 0000000..71b70a2 --- /dev/null +++ b/static/graphs/82cb34ba-02b5-432b-b2d2-07f55cbf674d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Trojan.Karagany - S0094" [label="mitre-enterprise-attack-malware\nTrojan.Karagany - S0094",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Trojan.Karagany - S0094" -> "mitre-enterprise-attack-attack-pattern=Software Packing - T1045" [label="uses",];} diff --git a/static/graphs/82cb34ba-02b5-432b-b2d2-07f55cbf674d.png b/static/graphs/82cb34ba-02b5-432b-b2d2-07f55cbf674d.png new file mode 100644 index 0000000..f1bc782 Binary files /dev/null and b/static/graphs/82cb34ba-02b5-432b-b2d2-07f55cbf674d.png differ diff --git a/static/graphs/82d8e990-c901-4aed-8596-cc002e7eb307 b/static/graphs/82d8e990-c901-4aed-8596-cc002e7eb307 new file mode 100644 index 0000000..da50fee --- /dev/null +++ b/static/graphs/82d8e990-c901-4aed-8596-cc002e7eb307 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=System Time Discovery Mitigation - T1124" [label="mitre-enterprise-attack-course-of-action\nSystem Time Discovery Mitigation - T1124",shape=ellipse];"mitre-enterprise-attack-course-of-action=System Time Discovery Mitigation - T1124" -> "mitre-enterprise-attack-attack-pattern=System Time Discovery - T1124" [label="mitigates",];} diff --git a/static/graphs/82d8e990-c901-4aed-8596-cc002e7eb307.png b/static/graphs/82d8e990-c901-4aed-8596-cc002e7eb307.png new file mode 100644 index 0000000..0f19a68 Binary files /dev/null and b/static/graphs/82d8e990-c901-4aed-8596-cc002e7eb307.png differ diff --git a/static/graphs/82fbc58b-171d-4a2d-9a20-c6b2a716bd08 b/static/graphs/82fbc58b-171d-4a2d-9a20-c6b2a716bd08 new file mode 100644 index 0000000..9995a55 --- /dev/null +++ b/static/graphs/82fbc58b-171d-4a2d-9a20-c6b2a716bd08 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Code Signing Mitigation - T1116" [label="mitre-enterprise-attack-course-of-action\nCode Signing Mitigation - T1116",shape=ellipse];"mitre-enterprise-attack-course-of-action=Code Signing Mitigation - T1116" -> "mitre-enterprise-attack-attack-pattern=Code Signing - T1116" [label="mitigates",];} diff --git a/static/graphs/82fbc58b-171d-4a2d-9a20-c6b2a716bd08.png b/static/graphs/82fbc58b-171d-4a2d-9a20-c6b2a716bd08.png new file mode 100644 index 0000000..c346526 Binary files /dev/null and b/static/graphs/82fbc58b-171d-4a2d-9a20-c6b2a716bd08.png differ diff --git a/static/graphs/831e3269-da49-48ac-94dc-948008e8fd16 b/static/graphs/831e3269-da49-48ac-94dc-948008e8fd16 new file mode 100644 index 0000000..6716764 --- /dev/null +++ b/static/graphs/831e3269-da49-48ac-94dc-948008e8fd16 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Remotely Install Application - MOB-T1046" [label="mitre-mobile-attack-attack-pattern\nRemotely Install Application - MOB-T1046",shape=ellipse];} diff --git a/static/graphs/831e3269-da49-48ac-94dc-948008e8fd16.png b/static/graphs/831e3269-da49-48ac-94dc-948008e8fd16.png new file mode 100644 index 0000000..8029232 Binary files /dev/null and b/static/graphs/831e3269-da49-48ac-94dc-948008e8fd16.png differ diff --git a/static/graphs/834e0acd-d92a-4e38-bb14-dc4159d7cb32 b/static/graphs/834e0acd-d92a-4e38-bb14-dc4159d7cb32 new file mode 100644 index 0000000..cba27f3 --- /dev/null +++ b/static/graphs/834e0acd-d92a-4e38-bb14-dc4159d7cb32 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=EMISSARY PANDA" [label="threat-actor\nEMISSARY PANDA",shape=octagon,style=filled,color=indianred1];"threat-actor=EMISSARY PANDA" -> "mitre-enterprise-attack-intrusion-set=Threat Group-3390 - G0027" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Threat Group-3390 - G0027" [label="mitre-enterprise-attack-intrusion-set\nThreat Group-3390 - G0027",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Threat Group-3390 - G0027" -> "mitre-enterprise-attack-tool=ipconfig - S0100" [label="uses",];"mitre-enterprise-attack-tool=ipconfig - S0100" [label="mitre-enterprise-attack-tool\nipconfig - S0100",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=ipconfig - S0100" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];} diff --git a/static/graphs/834e0acd-d92a-4e38-bb14-dc4159d7cb32.png b/static/graphs/834e0acd-d92a-4e38-bb14-dc4159d7cb32.png new file mode 100644 index 0000000..aad4575 Binary files /dev/null and b/static/graphs/834e0acd-d92a-4e38-bb14-dc4159d7cb32.png differ diff --git a/static/graphs/837a295c-15ff-41c0-9b7e-5f2fb502b00a b/static/graphs/837a295c-15ff-41c0-9b7e-5f2fb502b00a new file mode 100644 index 0000000..62b5811 --- /dev/null +++ b/static/graphs/837a295c-15ff-41c0-9b7e-5f2fb502b00a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Downdelph" [label="tool\nDowndelph",shape=box,style=filled,color=deepskyblue];"tool=Downdelph" -> "mitre-enterprise-attack-malware=Downdelph - S0134" [label="similar",dir="both"];"tool=Downdelph" -> "malpedia=Downdelph" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Downdelph - S0134" [label="mitre-enterprise-attack-malware\nDowndelph - S0134",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Downdelph - S0134" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/837a295c-15ff-41c0-9b7e-5f2fb502b00a.png b/static/graphs/837a295c-15ff-41c0-9b7e-5f2fb502b00a.png new file mode 100644 index 0000000..b76689b Binary files /dev/null and b/static/graphs/837a295c-15ff-41c0-9b7e-5f2fb502b00a.png differ diff --git a/static/graphs/83d10b83-9038-4dd6-b305-f14c21478588 b/static/graphs/83d10b83-9038-4dd6-b305-f14c21478588 new file mode 100644 index 0000000..bdf3736 --- /dev/null +++ b/static/graphs/83d10b83-9038-4dd6-b305-f14c21478588 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=SyncCrypt" [label="ransomware\nSyncCrypt",shape=box,style=filled,color=deepskyblue];"ransomware=SyncCrypt" -> "malpedia=SyncCrypt" [label="similar",dir="both"];} diff --git a/static/graphs/83d10b83-9038-4dd6-b305-f14c21478588.png b/static/graphs/83d10b83-9038-4dd6-b305-f14c21478588.png new file mode 100644 index 0000000..a91187a Binary files /dev/null and b/static/graphs/83d10b83-9038-4dd6-b305-f14c21478588.png differ diff --git a/static/graphs/844417c6-a404-4c4e-8e93-84db596d725b b/static/graphs/844417c6-a404-4c4e-8e93-84db596d725b new file mode 100644 index 0000000..4a1a3f7 --- /dev/null +++ b/static/graphs/844417c6-a404-4c4e-8e93-84db596d725b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=DanaBot" [label="banker\nDanaBot",shape=box,style=filled,color=deepskyblue];"banker=DanaBot" -> "malpedia=DanaBot" [label="similar",dir="both"];} diff --git a/static/graphs/844417c6-a404-4c4e-8e93-84db596d725b.png b/static/graphs/844417c6-a404-4c4e-8e93-84db596d725b.png new file mode 100644 index 0000000..6251fac Binary files /dev/null and b/static/graphs/844417c6-a404-4c4e-8e93-84db596d725b.png differ diff --git a/static/graphs/84d633a4-dd93-40ca-8510-40238c021931 b/static/graphs/84d633a4-dd93-40ca-8510-40238c021931 new file mode 100644 index 0000000..cf02efb --- /dev/null +++ b/static/graphs/84d633a4-dd93-40ca-8510-40238c021931 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Hidden Files and Directories Mitigation - T1158" [label="mitre-enterprise-attack-course-of-action\nHidden Files and Directories Mitigation - T1158",shape=ellipse];"mitre-enterprise-attack-course-of-action=Hidden Files and Directories Mitigation - T1158" -> "mitre-enterprise-attack-attack-pattern=Hidden Files and Directories - T1158" [label="mitigates",];} diff --git a/static/graphs/84d633a4-dd93-40ca-8510-40238c021931.png b/static/graphs/84d633a4-dd93-40ca-8510-40238c021931.png new file mode 100644 index 0000000..14ea1fa Binary files /dev/null and b/static/graphs/84d633a4-dd93-40ca-8510-40238c021931.png differ diff --git a/static/graphs/85403903-15e0-4f9f-9be4-a259ecad4022 b/static/graphs/85403903-15e0-4f9f-9be4-a259ecad4022 new file mode 100644 index 0000000..ac85d9b --- /dev/null +++ b/static/graphs/85403903-15e0-4f9f-9be4-a259ecad4022 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=FIN5 - G0053" [label="mitre-enterprise-attack-intrusion-set\nFIN5 - G0053",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=FIN5 - G0053" -> "mitre-enterprise-attack-malware=FLIPSIDE - S0173" [label="uses",];"mitre-enterprise-attack-malware=FLIPSIDE - S0173" [label="mitre-enterprise-attack-malware\nFLIPSIDE - S0173",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=FLIPSIDE - S0173" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/85403903-15e0-4f9f-9be4-a259ecad4022.png b/static/graphs/85403903-15e0-4f9f-9be4-a259ecad4022.png new file mode 100644 index 0000000..0326c7d Binary files /dev/null and b/static/graphs/85403903-15e0-4f9f-9be4-a259ecad4022.png differ diff --git a/static/graphs/856a9371-4f0f-4ea9-946e-f3144204240f b/static/graphs/856a9371-4f0f-4ea9-946e-f3144204240f new file mode 100644 index 0000000..b2fac85 --- /dev/null +++ b/static/graphs/856a9371-4f0f-4ea9-946e-f3144204240f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Determine 3rd party infrastructure services - PRE-T1037" [label="mitre-pre-attack-attack-pattern\nDetermine 3rd party infrastructure services - PRE-T1037",shape=ellipse];"mitre-pre-attack-attack-pattern=Determine 3rd party infrastructure services - PRE-T1037" -> "mitre-pre-attack-attack-pattern=Determine 3rd party infrastructure services - PRE-T1061" [label="related-to",];"mitre-pre-attack-attack-pattern=Determine 3rd party infrastructure services - PRE-T1061" [label="mitre-pre-attack-attack-pattern\nDetermine 3rd party infrastructure services - PRE-T1061",shape=ellipse];"mitre-pre-attack-attack-pattern=Determine 3rd party infrastructure services - PRE-T1061" -> "mitre-pre-attack-attack-pattern=Determine 3rd party infrastructure services - PRE-T1037" [label="related-to",];} diff --git a/static/graphs/856a9371-4f0f-4ea9-946e-f3144204240f.png b/static/graphs/856a9371-4f0f-4ea9-946e-f3144204240f.png new file mode 100644 index 0000000..8e91d26 Binary files /dev/null and b/static/graphs/856a9371-4f0f-4ea9-946e-f3144204240f.png differ diff --git a/static/graphs/858edfb8-793a-430b-8acc-4310e7d2f0d3 b/static/graphs/858edfb8-793a-430b-8acc-4310e7d2f0d3 new file mode 100644 index 0000000..4ccd31f --- /dev/null +++ b/static/graphs/858edfb8-793a-430b-8acc-4310e7d2f0d3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Crimson" [label="tool\nCrimson",shape=box,style=filled,color=deepskyblue];"tool=Crimson" -> "rat=Crimson" [label="similar",dir="both"];"tool=Crimson" -> "mitre-enterprise-attack-malware=Crimson - S0115" [label="similar",dir="both"];"tool=Crimson" -> "malpedia=Crimson RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Crimson - S0115" [label="mitre-enterprise-attack-malware\nCrimson - S0115",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Crimson - S0115" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];"rat=Crimson" [label="rat\nCrimson",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/858edfb8-793a-430b-8acc-4310e7d2f0d3.png b/static/graphs/858edfb8-793a-430b-8acc-4310e7d2f0d3.png new file mode 100644 index 0000000..b7df55b Binary files /dev/null and b/static/graphs/858edfb8-793a-430b-8acc-4310e7d2f0d3.png differ diff --git a/static/graphs/85b1f79e-49e7-4501-9b5c-a39ffce47428 b/static/graphs/85b1f79e-49e7-4501-9b5c-a39ffce47428 new file mode 100644 index 0000000..05bf3a7 --- /dev/null +++ b/static/graphs/85b1f79e-49e7-4501-9b5c-a39ffce47428 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Malicious Code:C2 Server" [label="rsit\nMalicious Code:C2 Server",shape=ellipse];"rsit=Malicious Code:C2 Server" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Command and Control Channel - T1041" [label="similar",dir="both"];} diff --git a/static/graphs/85b1f79e-49e7-4501-9b5c-a39ffce47428.png b/static/graphs/85b1f79e-49e7-4501-9b5c-a39ffce47428.png new file mode 100644 index 0000000..037f5ea Binary files /dev/null and b/static/graphs/85b1f79e-49e7-4501-9b5c-a39ffce47428.png differ diff --git a/static/graphs/85b39628-204a-48d2-b377-ec368cbcb7ca b/static/graphs/85b39628-204a-48d2-b377-ec368cbcb7ca new file mode 100644 index 0000000..5390ac2 --- /dev/null +++ b/static/graphs/85b39628-204a-48d2-b377-ec368cbcb7ca @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=TINYTYPHON - S0131" [label="mitre-enterprise-attack-malware\nTINYTYPHON - S0131",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TINYTYPHON - S0131" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];} diff --git a/static/graphs/85b39628-204a-48d2-b377-ec368cbcb7ca.png b/static/graphs/85b39628-204a-48d2-b377-ec368cbcb7ca.png new file mode 100644 index 0000000..435d227 Binary files /dev/null and b/static/graphs/85b39628-204a-48d2-b377-ec368cbcb7ca.png differ diff --git a/static/graphs/86724806-7ec9-4a48-a0a7-ecbde3bf4810 b/static/graphs/86724806-7ec9-4a48-a0a7-ecbde3bf4810 new file mode 100644 index 0000000..02d5609 --- /dev/null +++ b/static/graphs/86724806-7ec9-4a48-a0a7-ecbde3bf4810 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=Cleaver" -> "mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="similar",dir="both"];"threat-actor=Cleaver" -> "threat-actor=Cutting Kitten" [label="similar",dir="both"];"threat-actor=Cleaver" -> "threat-actor=OilRig" [label="similar",dir="both"];"threat-actor=Cleaver" -> "threat-actor=Clever Kitten" [label="similar",dir="both"];"threat-actor=Cleaver" -> "threat-actor=CHRYSENE" [label="similar",dir="both"];"threat-actor=Cleaver" -> "mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="similar",dir="both"];"threat-actor=Cleaver" -> "threat-actor=Flying Kitten" [label="similar",dir="both"];"threat-actor=Cleaver" -> "threat-actor=Charming Kitten" [label="similar",dir="both"];"threat-actor=Cleaver" -> "threat-actor=Rocket Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="similar",dir="both"];"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "threat-actor=Greenbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/86724806-7ec9-4a48-a0a7-ecbde3bf4810.png b/static/graphs/86724806-7ec9-4a48-a0a7-ecbde3bf4810.png new file mode 100644 index 0000000..14fa8e3 Binary files /dev/null and b/static/graphs/86724806-7ec9-4a48-a0a7-ecbde3bf4810.png differ diff --git a/static/graphs/86d45c08-bb85-4d0f-a5d5-3d73d65bd2e5 b/static/graphs/86d45c08-bb85-4d0f-a5d5-3d73d65bd2e5 new file mode 100644 index 0000000..7128e8c --- /dev/null +++ b/static/graphs/86d45c08-bb85-4d0f-a5d5-3d73d65bd2e5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Empty" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/86d45c08-bb85-4d0f-a5d5-3d73d65bd2e5.png b/static/graphs/86d45c08-bb85-4d0f-a5d5-3d73d65bd2e5.png new file mode 100644 index 0000000..3ab9558 Binary files /dev/null and b/static/graphs/86d45c08-bb85-4d0f-a5d5-3d73d65bd2e5.png differ diff --git a/static/graphs/876f6a77-fbc5-4e13-ab1a-5611986730a3 b/static/graphs/876f6a77-fbc5-4e13-ab1a-5611986730a3 new file mode 100644 index 0000000..a9e0027 --- /dev/null +++ b/static/graphs/876f6a77-fbc5-4e13-ab1a-5611986730a3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=T9000 - S0098" [label="mitre-enterprise-attack-malware\nT9000 - S0098",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=T9000 - S0098" -> "tool=T9000" [label="similar",dir="both"];"mitre-enterprise-attack-malware=T9000 - S0098" -> "mitre-enterprise-attack-attack-pattern=AppInit DLLs - T1103" [label="uses",];"tool=T9000" [label="tool\nT9000",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/876f6a77-fbc5-4e13-ab1a-5611986730a3.png b/static/graphs/876f6a77-fbc5-4e13-ab1a-5611986730a3.png new file mode 100644 index 0000000..6a07393 Binary files /dev/null and b/static/graphs/876f6a77-fbc5-4e13-ab1a-5611986730a3.png differ diff --git a/static/graphs/87b69cb4-8b65-47ee-91b0-9b1decdd5c5c b/static/graphs/87b69cb4-8b65-47ee-91b0-9b1decdd5c5c new file mode 100644 index 0000000..e6ef625 --- /dev/null +++ b/static/graphs/87b69cb4-8b65-47ee-91b0-9b1decdd5c5c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Retefe" [label="banker\nRetefe",shape=box,style=filled,color=deepskyblue];"banker=Retefe" -> "malpedia=Retefe (Android)" [label="similar",dir="both"];"banker=Retefe" -> "malpedia=Dok" [label="similar",dir="both"];} diff --git a/static/graphs/87b69cb4-8b65-47ee-91b0-9b1decdd5c5c.png b/static/graphs/87b69cb4-8b65-47ee-91b0-9b1decdd5c5c.png new file mode 100644 index 0000000..70d118b Binary files /dev/null and b/static/graphs/87b69cb4-8b65-47ee-91b0-9b1decdd5c5c.png differ diff --git a/static/graphs/88b7dbc2-32d3-4e31-af2f-3fc24e1582d7 b/static/graphs/88b7dbc2-32d3-4e31-af2f-3fc24e1582d7 new file mode 100644 index 0000000..966d361 --- /dev/null +++ b/static/graphs/88b7dbc2-32d3-4e31-af2f-3fc24e1582d7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Lotus Blossom - G0030" [label="mitre-enterprise-attack-intrusion-set\nLotus Blossom - G0030",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Lotus Blossom - G0030" -> "threat-actor=Lotus Blossom" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Lotus Blossom - G0030" -> "mitre-enterprise-attack-malware=Emissary - S0082" [label="uses",];"mitre-enterprise-attack-malware=Emissary - S0082" [label="mitre-enterprise-attack-malware\nEmissary - S0082",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Emissary - S0082" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];"threat-actor=Lotus Blossom" [label="threat-actor\nLotus Blossom",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/88b7dbc2-32d3-4e31-af2f-3fc24e1582d7.png b/static/graphs/88b7dbc2-32d3-4e31-af2f-3fc24e1582d7.png new file mode 100644 index 0000000..a0c96f4 Binary files /dev/null and b/static/graphs/88b7dbc2-32d3-4e31-af2f-3fc24e1582d7.png differ diff --git a/static/graphs/88c621a7-aef9-4ae0-94e3-1fc87123eb24 b/static/graphs/88c621a7-aef9-4ae0-94e3-1fc87123eb24 new file mode 100644 index 0000000..75457e8 --- /dev/null +++ b/static/graphs/88c621a7-aef9-4ae0-94e3-1fc87123eb24 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=gh0st - S0032" [label="mitre-enterprise-attack-malware\ngh0st - S0032",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=gh0st - S0032" -> "tool=gh0st" [label="similar",dir="both"];"mitre-enterprise-attack-malware=gh0st - S0032" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];"tool=gh0st" [label="tool\ngh0st",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/88c621a7-aef9-4ae0-94e3-1fc87123eb24.png b/static/graphs/88c621a7-aef9-4ae0-94e3-1fc87123eb24.png new file mode 100644 index 0000000..6d5a813 Binary files /dev/null and b/static/graphs/88c621a7-aef9-4ae0-94e3-1fc87123eb24.png differ diff --git a/static/graphs/8901ac23-6b50-410c-b0dd-d8174a86f9b3 b/static/graphs/8901ac23-6b50-410c-b0dd-d8174a86f9b3 new file mode 100644 index 0000000..7efcb82 --- /dev/null +++ b/static/graphs/8901ac23-6b50-410c-b0dd-d8174a86f9b3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Shamoon - S0140" [label="mitre-enterprise-attack-malware\nShamoon - S0140",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Shamoon - S0140" -> "tool=Shamoon" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Shamoon - S0140" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];"tool=Shamoon" [label="tool\nShamoon",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8901ac23-6b50-410c-b0dd-d8174a86f9b3.png b/static/graphs/8901ac23-6b50-410c-b0dd-d8174a86f9b3.png new file mode 100644 index 0000000..bdac2fd Binary files /dev/null and b/static/graphs/8901ac23-6b50-410c-b0dd-d8174a86f9b3.png differ diff --git a/static/graphs/8914802c-3aca-4a0d-874a-85ac7a1bc505 b/static/graphs/8914802c-3aca-4a0d-874a-85ac7a1bc505 new file mode 100644 index 0000000..fd28e8f --- /dev/null +++ b/static/graphs/8914802c-3aca-4a0d-874a-85ac7a1bc505 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Zeus Sphinx" [label="banker\nZeus Sphinx",shape=box,style=filled,color=deepskyblue];"banker=Zeus Sphinx" -> "malpedia=Zeus Sphinx" [label="similar",dir="both"];} diff --git a/static/graphs/8914802c-3aca-4a0d-874a-85ac7a1bc505.png b/static/graphs/8914802c-3aca-4a0d-874a-85ac7a1bc505.png new file mode 100644 index 0000000..ca6dd56 Binary files /dev/null and b/static/graphs/8914802c-3aca-4a0d-874a-85ac7a1bc505.png differ diff --git a/static/graphs/894aab42-3371-47b1-8859-a4a074c804c8 b/static/graphs/894aab42-3371-47b1-8859-a4a074c804c8 new file mode 100644 index 0000000..4fb48a9 --- /dev/null +++ b/static/graphs/894aab42-3371-47b1-8859-a4a074c804c8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Stealth Falcon - G0038" [label="mitre-enterprise-attack-intrusion-set\nStealth Falcon - G0038",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Stealth Falcon - G0038" -> "threat-actor=Stealth Falcon" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Stealth Falcon - G0038" -> "mitre-enterprise-attack-attack-pattern=Windows Management Instrumentation - T1047" [label="uses",];"threat-actor=Stealth Falcon" [label="threat-actor\nStealth Falcon",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/894aab42-3371-47b1-8859-a4a074c804c8.png b/static/graphs/894aab42-3371-47b1-8859-a4a074c804c8.png new file mode 100644 index 0000000..a95a257 Binary files /dev/null and b/static/graphs/894aab42-3371-47b1-8859-a4a074c804c8.png differ diff --git a/static/graphs/899ce53f-13a0-479b-a0e4-67d46e241542 b/static/graphs/899ce53f-13a0-479b-a0e4-67d46e241542 new file mode 100644 index 0000000..cfbb3b2 --- /dev/null +++ b/static/graphs/899ce53f-13a0-479b-a0e4-67d46e241542 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=APT29 - G0016" [label="mitre-enterprise-attack-intrusion-set\nAPT29 - G0016",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT29 - G0016" -> "threat-actor=APT 29" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT29 - G0016" -> "mitre-enterprise-attack-attack-pattern=Bypass User Account Control - T1088" [label="uses",];"threat-actor=APT 29" [label="threat-actor\nAPT 29",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/899ce53f-13a0-479b-a0e4-67d46e241542.png b/static/graphs/899ce53f-13a0-479b-a0e4-67d46e241542.png new file mode 100644 index 0000000..0d9eda4 Binary files /dev/null and b/static/graphs/899ce53f-13a0-479b-a0e4-67d46e241542.png differ diff --git a/static/graphs/89bd2020-2594-45c4-8957-522c0ac41370 b/static/graphs/89bd2020-2594-45c4-8957-522c0ac41370 new file mode 100644 index 0000000..aabf1aa --- /dev/null +++ b/static/graphs/89bd2020-2594-45c4-8957-522c0ac41370 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=CoinMiner" [label="tool\nCoinMiner",shape=box,style=filled,color=deepskyblue];"tool=CoinMiner" -> "malpedia=Monero Miner" [label="similar",dir="both"];} diff --git a/static/graphs/89bd2020-2594-45c4-8957-522c0ac41370.png b/static/graphs/89bd2020-2594-45c4-8957-522c0ac41370.png new file mode 100644 index 0000000..b80af3a Binary files /dev/null and b/static/graphs/89bd2020-2594-45c4-8957-522c0ac41370.png differ diff --git a/static/graphs/89f63ae4-f229-4a5c-95ad-6f22ed2b5c49 b/static/graphs/89f63ae4-f229-4a5c-95ad-6f22ed2b5c49 new file mode 100644 index 0000000..649f537 --- /dev/null +++ b/static/graphs/89f63ae4-f229-4a5c-95ad-6f22ed2b5c49 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Skeleton Key - S0007" [label="mitre-enterprise-attack-malware\nSkeleton Key - S0007",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Skeleton Key - S0007" -> "mitre-enterprise-attack-attack-pattern=Account Manipulation - T1098" [label="uses",];} diff --git a/static/graphs/89f63ae4-f229-4a5c-95ad-6f22ed2b5c49.png b/static/graphs/89f63ae4-f229-4a5c-95ad-6f22ed2b5c49.png new file mode 100644 index 0000000..a6c6a83 Binary files /dev/null and b/static/graphs/89f63ae4-f229-4a5c-95ad-6f22ed2b5c49.png differ diff --git a/static/graphs/8a21ae06-d257-48a0-989b-1c9aebedabc2 b/static/graphs/8a21ae06-d257-48a0-989b-1c9aebedabc2 new file mode 100644 index 0000000..1fc1388 --- /dev/null +++ b/static/graphs/8a21ae06-d257-48a0-989b-1c9aebedabc2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=DarkComet" [label="rat\nDarkComet",shape=box,style=filled,color=deepskyblue];"rat=DarkComet" -> "tool=Dark Comet" [label="similar",dir="both"];"rat=DarkComet" -> "malpedia=DarkComet" [label="similar",dir="both"];"tool=Dark Comet" [label="tool\nDark Comet",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8a21ae06-d257-48a0-989b-1c9aebedabc2.png b/static/graphs/8a21ae06-d257-48a0-989b-1c9aebedabc2.png new file mode 100644 index 0000000..c95b4a1 Binary files /dev/null and b/static/graphs/8a21ae06-d257-48a0-989b-1c9aebedabc2.png differ diff --git a/static/graphs/8a3d46db-d3b4-4f89-99e2-d1f0de3f484c b/static/graphs/8a3d46db-d3b4-4f89-99e2-d1f0de3f484c new file mode 100644 index 0000000..20d2c54 --- /dev/null +++ b/static/graphs/8a3d46db-d3b4-4f89-99e2-d1f0de3f484c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Corebot" [label="banker\nCorebot",shape=box,style=filled,color=deepskyblue];"banker=Corebot" -> "malpedia=Corebot" [label="similar",dir="both"];} diff --git a/static/graphs/8a3d46db-d3b4-4f89-99e2-d1f0de3f484c.png b/static/graphs/8a3d46db-d3b4-4f89-99e2-d1f0de3f484c.png new file mode 100644 index 0000000..e149299 Binary files /dev/null and b/static/graphs/8a3d46db-d3b4-4f89-99e2-d1f0de3f484c.png differ diff --git a/static/graphs/8a61f6b9-6b7a-4cf2-8e08-f1e26434f6df b/static/graphs/8a61f6b9-6b7a-4cf2-8e08-f1e26434f6df new file mode 100644 index 0000000..69fb284 --- /dev/null +++ b/static/graphs/8a61f6b9-6b7a-4cf2-8e08-f1e26434f6df @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Input Prompt Mitigation - T1141" [label="mitre-enterprise-attack-course-of-action\nInput Prompt Mitigation - T1141",shape=ellipse];"mitre-enterprise-attack-course-of-action=Input Prompt Mitigation - T1141" -> "mitre-enterprise-attack-attack-pattern=Input Prompt - T1141" [label="mitigates",];} diff --git a/static/graphs/8a61f6b9-6b7a-4cf2-8e08-f1e26434f6df.png b/static/graphs/8a61f6b9-6b7a-4cf2-8e08-f1e26434f6df.png new file mode 100644 index 0000000..83184ba Binary files /dev/null and b/static/graphs/8a61f6b9-6b7a-4cf2-8e08-f1e26434f6df.png differ diff --git a/static/graphs/8ab98e25-1672-4b5f-a2fb-e60f08a5ea9e b/static/graphs/8ab98e25-1672-4b5f-a2fb-e60f08a5ea9e new file mode 100644 index 0000000..b637762 --- /dev/null +++ b/static/graphs/8ab98e25-1672-4b5f-a2fb-e60f08a5ea9e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=CORALDECK - S0212" [label="mitre-enterprise-attack-malware\nCORALDECK - S0212",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CORALDECK - S0212" -> "tool=CORALDECK" [label="similar",dir="both"];"mitre-enterprise-attack-malware=CORALDECK - S0212" -> "mitre-enterprise-attack-attack-pattern=Data Compressed - T1002" [label="uses",];"tool=CORALDECK" [label="tool\nCORALDECK",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8ab98e25-1672-4b5f-a2fb-e60f08a5ea9e.png b/static/graphs/8ab98e25-1672-4b5f-a2fb-e60f08a5ea9e.png new file mode 100644 index 0000000..c80be74 Binary files /dev/null and b/static/graphs/8ab98e25-1672-4b5f-a2fb-e60f08a5ea9e.png differ diff --git a/static/graphs/8ae43c46-57ef-47d5-a77a-eebb35628db2 b/static/graphs/8ae43c46-57ef-47d5-a77a-eebb35628db2 new file mode 100644 index 0000000..e690e2d --- /dev/null +++ b/static/graphs/8ae43c46-57ef-47d5-a77a-eebb35628db2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="mitre-enterprise-attack-malware\nJHUHUGIT - S0044",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "tool=GAMEFISH" [label="similar",dir="both"];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "tool=SOURFACE" [label="similar",dir="both"];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "tool=CORESHELL" [label="similar",dir="both"];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "malpedia=Komplex" [label="similar",dir="both"];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "malpedia=Seduploader" [label="similar",dir="both"];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Privilege Escalation - T1068" [label="uses",];"tool=GAMEFISH" [label="tool\nGAMEFISH",shape=box,style=filled,color=deepskyblue];"tool=GAMEFISH" -> "android=Sofacy" [label="similar",dir="both"];"tool=GAMEFISH" -> "mitre-enterprise-attack-malware=Komplex - S0162" [label="similar",dir="both"];"tool=SOURFACE" [label="tool\nSOURFACE",shape=box,style=filled,color=deepskyblue];"tool=SOURFACE" -> "mitre-enterprise-attack-malware=CORESHELL - S0137" [label="similar",dir="both"];"tool=CORESHELL" [label="tool\nCORESHELL",shape=box,style=filled,color=deepskyblue];"android=Sofacy" [label="android\nSofacy",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" [label="mitre-enterprise-attack-malware\nKomplex - S0162",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"mitre-enterprise-attack-malware=CORESHELL - S0137" [label="mitre-enterprise-attack-malware\nCORESHELL - S0137",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CORESHELL - S0137" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];} diff --git a/static/graphs/8ae43c46-57ef-47d5-a77a-eebb35628db2.png b/static/graphs/8ae43c46-57ef-47d5-a77a-eebb35628db2.png new file mode 100644 index 0000000..57d4cf8 Binary files /dev/null and b/static/graphs/8ae43c46-57ef-47d5-a77a-eebb35628db2.png differ diff --git a/static/graphs/8b36d944-f274-4d46-9acd-dbba6927ce7a b/static/graphs/8b36d944-f274-4d46-9acd-dbba6927ce7a new file mode 100644 index 0000000..b577e37 --- /dev/null +++ b/static/graphs/8b36d944-f274-4d46-9acd-dbba6927ce7a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Registry Run Keys / Start Folder Mitigation - T1060" [label="mitre-enterprise-attack-course-of-action\nRegistry Run Keys / Start Folder Mitigation - T1060",shape=ellipse];"mitre-enterprise-attack-course-of-action=Registry Run Keys / Start Folder Mitigation - T1060" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="mitigates",];} diff --git a/static/graphs/8b36d944-f274-4d46-9acd-dbba6927ce7a.png b/static/graphs/8b36d944-f274-4d46-9acd-dbba6927ce7a.png new file mode 100644 index 0000000..91e627f Binary files /dev/null and b/static/graphs/8b36d944-f274-4d46-9acd-dbba6927ce7a.png differ diff --git a/static/graphs/8b880b41-5139-4807-baa9-309690218719 b/static/graphs/8b880b41-5139-4807-baa9-309690218719 new file mode 100644 index 0000000..d375228 --- /dev/null +++ b/static/graphs/8b880b41-5139-4807-baa9-309690218719 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=SPACESHIP - S0035" [label="mitre-enterprise-attack-malware\nSPACESHIP - S0035",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SPACESHIP - S0035" -> "mitre-enterprise-attack-attack-pattern=Shortcut Modification - T1023" [label="uses",];} diff --git a/static/graphs/8b880b41-5139-4807-baa9-309690218719.png b/static/graphs/8b880b41-5139-4807-baa9-309690218719.png new file mode 100644 index 0000000..577d078 Binary files /dev/null and b/static/graphs/8b880b41-5139-4807-baa9-309690218719.png differ diff --git a/static/graphs/8bd094a7-103f-465f-8640-18dcc53042e5 b/static/graphs/8bd094a7-103f-465f-8640-18dcc53042e5 new file mode 100644 index 0000000..45c010b --- /dev/null +++ b/static/graphs/8bd094a7-103f-465f-8640-18dcc53042e5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Egregor" [label="ransomware\nEgregor",shape=box,style=filled,color=deepskyblue];"ransomware=Egregor" -> "ransomware=Sekhmet" [label="variant-of",];"ransomware=Sekhmet" [label="ransomware\nSekhmet",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8bd094a7-103f-465f-8640-18dcc53042e5.png b/static/graphs/8bd094a7-103f-465f-8640-18dcc53042e5.png new file mode 100644 index 0000000..2590649 Binary files /dev/null and b/static/graphs/8bd094a7-103f-465f-8640-18dcc53042e5.png differ diff --git a/static/graphs/8bd1ae32-a686-48f4-a6f8-470287f76152 b/static/graphs/8bd1ae32-a686-48f4-a6f8-470287f76152 new file mode 100644 index 0000000..e688701 --- /dev/null +++ b/static/graphs/8bd1ae32-a686-48f4-a6f8-470287f76152 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Automated Collection Mitigation - T1119" [label="mitre-enterprise-attack-course-of-action\nAutomated Collection Mitigation - T1119",shape=ellipse];"mitre-enterprise-attack-course-of-action=Automated Collection Mitigation - T1119" -> "mitre-enterprise-attack-attack-pattern=Automated Collection - T1119" [label="mitigates",];} diff --git a/static/graphs/8bd1ae32-a686-48f4-a6f8-470287f76152.png b/static/graphs/8bd1ae32-a686-48f4-a6f8-470287f76152.png new file mode 100644 index 0000000..d591fea Binary files /dev/null and b/static/graphs/8bd1ae32-a686-48f4-a6f8-470287f76152.png differ diff --git a/static/graphs/8beac7c2-48d2-4cd9-9b15-6c452f38ac06 b/static/graphs/8beac7c2-48d2-4cd9-9b15-6c452f38ac06 new file mode 100644 index 0000000..29798e7 --- /dev/null +++ b/static/graphs/8beac7c2-48d2-4cd9-9b15-6c452f38ac06 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Ixeshe - S0015" [label="mitre-enterprise-attack-malware\nIxeshe - S0015",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Ixeshe - S0015" -> "mitre-enterprise-attack-attack-pattern=Data Obfuscation - T1001" [label="uses",];} diff --git a/static/graphs/8beac7c2-48d2-4cd9-9b15-6c452f38ac06.png b/static/graphs/8beac7c2-48d2-4cd9-9b15-6c452f38ac06.png new file mode 100644 index 0000000..8ce7f8b Binary files /dev/null and b/static/graphs/8beac7c2-48d2-4cd9-9b15-6c452f38ac06.png differ diff --git a/static/graphs/8c3202d5-1671-46ec-9d42-cb50dbe2f667 b/static/graphs/8c3202d5-1671-46ec-9d42-cb50dbe2f667 new file mode 100644 index 0000000..5819e86 --- /dev/null +++ b/static/graphs/8c3202d5-1671-46ec-9d42-cb50dbe2f667 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Blackshades" [label="tool\nBlackshades",shape=box,style=filled,color=deepskyblue];"tool=Blackshades" -> "rat=Blackshades" [label="similar",dir="both"];"rat=Blackshades" [label="rat\nBlackshades",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8c3202d5-1671-46ec-9d42-cb50dbe2f667.png b/static/graphs/8c3202d5-1671-46ec-9d42-cb50dbe2f667.png new file mode 100644 index 0000000..7e1aa62 Binary files /dev/null and b/static/graphs/8c3202d5-1671-46ec-9d42-cb50dbe2f667.png differ diff --git a/static/graphs/8c484784-308a-498f-948b-bc5df8ba4725 b/static/graphs/8c484784-308a-498f-948b-bc5df8ba4725 new file mode 100644 index 0000000..a15b835 --- /dev/null +++ b/static/graphs/8c484784-308a-498f-948b-bc5df8ba4725 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-CK" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8c484784-308a-498f-948b-bc5df8ba4725.png b/static/graphs/8c484784-308a-498f-948b-bc5df8ba4725.png new file mode 100644 index 0000000..c82fc88 Binary files /dev/null and b/static/graphs/8c484784-308a-498f-948b-bc5df8ba4725.png differ diff --git a/static/graphs/8c49da10-2b59-42c4-81e6-75556decdecb b/static/graphs/8c49da10-2b59-42c4-81e6-75556decdecb new file mode 100644 index 0000000..5cff2f2 --- /dev/null +++ b/static/graphs/8c49da10-2b59-42c4-81e6-75556decdecb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Cobian RAT" [label="rat\nCobian RAT",shape=box,style=filled,color=deepskyblue];"rat=Cobian RAT" -> "malpedia=Cobian RAT" [label="similar",dir="both"];} diff --git a/static/graphs/8c49da10-2b59-42c4-81e6-75556decdecb.png b/static/graphs/8c49da10-2b59-42c4-81e6-75556decdecb.png new file mode 100644 index 0000000..ba35bbc Binary files /dev/null and b/static/graphs/8c49da10-2b59-42c4-81e6-75556decdecb.png differ diff --git a/static/graphs/8c553311-0baa-4146-997a-f79acef3d831 b/static/graphs/8c553311-0baa-4146-997a-f79acef3d831 new file mode 100644 index 0000000..98860cd --- /dev/null +++ b/static/graphs/8c553311-0baa-4146-997a-f79acef3d831 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=RARSTONE - S0055" [label="mitre-enterprise-attack-malware\nRARSTONE - S0055",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RARSTONE - S0055" -> "tool=RARSTONE" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RARSTONE - S0055" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=RARSTONE" [label="tool\nRARSTONE",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8c553311-0baa-4146-997a-f79acef3d831.png b/static/graphs/8c553311-0baa-4146-997a-f79acef3d831.png new file mode 100644 index 0000000..2164eae Binary files /dev/null and b/static/graphs/8c553311-0baa-4146-997a-f79acef3d831.png differ diff --git a/static/graphs/8c918d8a-11c5-4ffd-af10-e74bc06bdfae b/static/graphs/8c918d8a-11c5-4ffd-af10-e74bc06bdfae new file mode 100644 index 0000000..81e7d2e --- /dev/null +++ b/static/graphs/8c918d8a-11c5-4ffd-af10-e74bc06bdfae @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Rundll32 Mitigation - T1085" [label="mitre-enterprise-attack-course-of-action\nRundll32 Mitigation - T1085",shape=ellipse];"mitre-enterprise-attack-course-of-action=Rundll32 Mitigation - T1085" -> "mitre-enterprise-attack-attack-pattern=Rundll32 - T1085" [label="mitigates",];} diff --git a/static/graphs/8c918d8a-11c5-4ffd-af10-e74bc06bdfae.png b/static/graphs/8c918d8a-11c5-4ffd-af10-e74bc06bdfae.png new file mode 100644 index 0000000..193029a Binary files /dev/null and b/static/graphs/8c918d8a-11c5-4ffd-af10-e74bc06bdfae.png differ diff --git a/static/graphs/8ca6a5e0-aae5-49bc-8d07-f888c7dba9ea b/static/graphs/8ca6a5e0-aae5-49bc-8d07-f888c7dba9ea new file mode 100644 index 0000000..490d215 --- /dev/null +++ b/static/graphs/8ca6a5e0-aae5-49bc-8d07-f888c7dba9ea @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Office Application Startup Mitigation - T1137" [label="mitre-enterprise-attack-course-of-action\nOffice Application Startup Mitigation - T1137",shape=ellipse];"mitre-enterprise-attack-course-of-action=Office Application Startup Mitigation - T1137" -> "mitre-enterprise-attack-attack-pattern=Office Application Startup - T1137" [label="mitigates",];} diff --git a/static/graphs/8ca6a5e0-aae5-49bc-8d07-f888c7dba9ea.png b/static/graphs/8ca6a5e0-aae5-49bc-8d07-f888c7dba9ea.png new file mode 100644 index 0000000..b8e3633 Binary files /dev/null and b/static/graphs/8ca6a5e0-aae5-49bc-8d07-f888c7dba9ea.png differ diff --git a/static/graphs/8cca9a1d-66e4-4bc4-ad49-95f759f4c1ae b/static/graphs/8cca9a1d-66e4-4bc4-ad49-95f759f4c1ae new file mode 100644 index 0000000..50974b3 --- /dev/null +++ b/static/graphs/8cca9a1d-66e4-4bc4-ad49-95f759f4c1ae @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=CopyKittens" [label="threat-actor\nCopyKittens",shape=octagon,style=filled,color=indianred1];"threat-actor=CopyKittens" -> "mitre-enterprise-attack-intrusion-set=CopyKittens - G0052" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=CopyKittens - G0052" [label="mitre-enterprise-attack-intrusion-set\nCopyKittens - G0052",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=CopyKittens - G0052" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];} diff --git a/static/graphs/8cca9a1d-66e4-4bc4-ad49-95f759f4c1ae.png b/static/graphs/8cca9a1d-66e4-4bc4-ad49-95f759f4c1ae.png new file mode 100644 index 0000000..e513486 Binary files /dev/null and b/static/graphs/8cca9a1d-66e4-4bc4-ad49-95f759f4c1ae.png differ diff --git a/static/graphs/8ccd428d-39da-4e8f-a55b-d48ea1d56e58 b/static/graphs/8ccd428d-39da-4e8f-a55b-d48ea1d56e58 new file mode 100644 index 0000000..ce9faf8 --- /dev/null +++ b/static/graphs/8ccd428d-39da-4e8f-a55b-d48ea1d56e58 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=Lock Bootloader - MOB-M1003" [label="mitre-mobile-attack-course-of-action\nLock Bootloader - MOB-M1003",shape=ellipse];"mitre-mobile-attack-course-of-action=Lock Bootloader - MOB-M1003" -> "mitre-mobile-attack-attack-pattern=Modify OS Kernel or Boot Partition - MOB-T1001" [label="mitigates",];"mitre-mobile-attack-course-of-action=Lock Bootloader - MOB-M1003" -> "mitre-mobile-attack-attack-pattern=Exploit via Charging Station or PC - MOB-T1061" [label="mitigates",];} diff --git a/static/graphs/8ccd428d-39da-4e8f-a55b-d48ea1d56e58.png b/static/graphs/8ccd428d-39da-4e8f-a55b-d48ea1d56e58.png new file mode 100644 index 0000000..3e167e4 Binary files /dev/null and b/static/graphs/8ccd428d-39da-4e8f-a55b-d48ea1d56e58.png differ diff --git a/static/graphs/8d51a22e-3485-4480-af96-8ed0305a7aa6 b/static/graphs/8d51a22e-3485-4480-af96-8ed0305a7aa6 new file mode 100644 index 0000000..e316954 --- /dev/null +++ b/static/graphs/8d51a22e-3485-4480-af96-8ed0305a7aa6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Locky" [label="ransomware\nLocky",shape=box,style=filled,color=deepskyblue];"ransomware=Locky" -> "malpedia=Locky" [label="similar",dir="both"];} diff --git a/static/graphs/8d51a22e-3485-4480-af96-8ed0305a7aa6.png b/static/graphs/8d51a22e-3485-4480-af96-8ed0305a7aa6.png new file mode 100644 index 0000000..54d070e Binary files /dev/null and b/static/graphs/8d51a22e-3485-4480-af96-8ed0305a7aa6.png differ diff --git a/static/graphs/8d8efbc6-d1b7-4ec8-bab3-591edba337d0 b/static/graphs/8d8efbc6-d1b7-4ec8-bab3-591edba337d0 new file mode 100644 index 0000000..3d999df --- /dev/null +++ b/static/graphs/8d8efbc6-d1b7-4ec8-bab3-591edba337d0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Crimson" [label="rat\nCrimson",shape=box,style=filled,color=deepskyblue];"rat=Crimson" -> "mitre-enterprise-attack-malware=Crimson - S0115" [label="similar",dir="both"];"rat=Crimson" -> "tool=Crimson" [label="similar",dir="both"];"rat=Crimson" -> "malpedia=Crimson RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Crimson - S0115" [label="mitre-enterprise-attack-malware\nCrimson - S0115",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Crimson - S0115" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];"tool=Crimson" [label="tool\nCrimson",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8d8efbc6-d1b7-4ec8-bab3-591edba337d0.png b/static/graphs/8d8efbc6-d1b7-4ec8-bab3-591edba337d0.png new file mode 100644 index 0000000..ccf4a72 Binary files /dev/null and b/static/graphs/8d8efbc6-d1b7-4ec8-bab3-591edba337d0.png differ diff --git a/static/graphs/8dda51ef-9a30-48f7-b0fd-5b6f0a62262d b/static/graphs/8dda51ef-9a30-48f7-b0fd-5b6f0a62262d new file mode 100644 index 0000000..650cec2 --- /dev/null +++ b/static/graphs/8dda51ef-9a30-48f7-b0fd-5b6f0a62262d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Operation Soft Cell" [label="threat-actor\nOperation Soft Cell",shape=octagon,style=filled,color=indianred1];"threat-actor=Operation Soft Cell" -> "threat-actor=GALLIUM" [label="similar",dir="both"];"threat-actor=GALLIUM" [label="threat-actor\nGALLIUM",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/8dda51ef-9a30-48f7-b0fd-5b6f0a62262d.png b/static/graphs/8dda51ef-9a30-48f7-b0fd-5b6f0a62262d.png new file mode 100644 index 0000000..add7fde Binary files /dev/null and b/static/graphs/8dda51ef-9a30-48f7-b0fd-5b6f0a62262d.png differ diff --git a/static/graphs/8e002f78-7fb8-4e70-afd7-0b4ac655be26 b/static/graphs/8e002f78-7fb8-4e70-afd7-0b4ac655be26 new file mode 100644 index 0000000..a931c8d --- /dev/null +++ b/static/graphs/8e002f78-7fb8-4e70-afd7-0b4ac655be26 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Geodo" [label="banker\nGeodo",shape=box,style=filled,color=deepskyblue];"banker=Geodo" -> "tool=Emotet" [label="similar",dir="both"];"banker=Geodo" -> "malpedia=Emotet" [label="similar",dir="both"];"tool=Emotet" [label="tool\nEmotet",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8e002f78-7fb8-4e70-afd7-0b4ac655be26.png b/static/graphs/8e002f78-7fb8-4e70-afd7-0b4ac655be26.png new file mode 100644 index 0000000..75e10ff Binary files /dev/null and b/static/graphs/8e002f78-7fb8-4e70-afd7-0b4ac655be26.png differ diff --git a/static/graphs/8e3d44d0-6768-4b54-88b0-2e004a7f2297 b/static/graphs/8e3d44d0-6768-4b54-88b0-2e004a7f2297 new file mode 100644 index 0000000..d0b35a4 --- /dev/null +++ b/static/graphs/8e3d44d0-6768-4b54-88b0-2e004a7f2297 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Jaff" [label="ransomware\nJaff",shape=box,style=filled,color=deepskyblue];"ransomware=Jaff" -> "malpedia=Jaff" [label="similar",dir="both"];} diff --git a/static/graphs/8e3d44d0-6768-4b54-88b0-2e004a7f2297.png b/static/graphs/8e3d44d0-6768-4b54-88b0-2e004a7f2297.png new file mode 100644 index 0000000..62f33ce Binary files /dev/null and b/static/graphs/8e3d44d0-6768-4b54-88b0-2e004a7f2297.png differ diff --git a/static/graphs/8e461ca3-0996-4e6e-a0df-e2a5bbc51ebc b/static/graphs/8e461ca3-0996-4e6e-a0df-e2a5bbc51ebc new file mode 100644 index 0000000..fe47ba4 --- /dev/null +++ b/static/graphs/8e461ca3-0996-4e6e-a0df-e2a5bbc51ebc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=4H RAT - S0065" [label="mitre-enterprise-attack-malware\n4H RAT - S0065",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=4H RAT - S0065" -> "rat=4H RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=4H RAT - S0065" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];"rat=4H RAT" [label="rat\n4H RAT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8e461ca3-0996-4e6e-a0df-e2a5bbc51ebc.png b/static/graphs/8e461ca3-0996-4e6e-a0df-e2a5bbc51ebc.png new file mode 100644 index 0000000..92ec29a Binary files /dev/null and b/static/graphs/8e461ca3-0996-4e6e-a0df-e2a5bbc51ebc.png differ diff --git a/static/graphs/8ed81090-f098-4878-b87e-2d801b170759 b/static/graphs/8ed81090-f098-4878-b87e-2d801b170759 new file mode 100644 index 0000000..2cde23d --- /dev/null +++ b/static/graphs/8ed81090-f098-4878-b87e-2d801b170759 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Ramnit" [label="botnet\nRamnit",shape=box,style=filled,color=deepskyblue];"botnet=Ramnit" -> "banker=Ramnit" [label="similar",dir="both"];"botnet=Ramnit" -> "malpedia=Ramnit" [label="similar",dir="both"];"banker=Ramnit" [label="banker\nRamnit",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8ed81090-f098-4878-b87e-2d801b170759.png b/static/graphs/8ed81090-f098-4878-b87e-2d801b170759.png new file mode 100644 index 0000000..ea8f6f5 Binary files /dev/null and b/static/graphs/8ed81090-f098-4878-b87e-2d801b170759.png differ diff --git a/static/graphs/8f5e8dc7-739d-4f5e-a8a1-a66e004d7063 b/static/graphs/8f5e8dc7-739d-4f5e-a8a1-a66e004d7063 new file mode 100644 index 0000000..c6fb09a --- /dev/null +++ b/static/graphs/8f5e8dc7-739d-4f5e-a8a1-a66e004d7063 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Cutting Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Cleaver" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=OilRig" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Clever Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=CHRYSENE" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Flying Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Charming Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Rocket Kitten" [label="similar",dir="both"];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="similar",dir="both"];"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "threat-actor=Greenbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/8f5e8dc7-739d-4f5e-a8a1-a66e004d7063.png b/static/graphs/8f5e8dc7-739d-4f5e-a8a1-a66e004d7063.png new file mode 100644 index 0000000..2b48ac1 Binary files /dev/null and b/static/graphs/8f5e8dc7-739d-4f5e-a8a1-a66e004d7063.png differ diff --git a/static/graphs/8f6b5ca6-263a-4ea9-98f3-afd2a3cd8119 b/static/graphs/8f6b5ca6-263a-4ea9-98f3-afd2a3cd8119 new file mode 100644 index 0000000..3fb1512 --- /dev/null +++ b/static/graphs/8f6b5ca6-263a-4ea9-98f3-afd2a3cd8119 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Spearphishing Attachment Mitigation - T1193" [label="mitre-enterprise-attack-course-of-action\nSpearphishing Attachment Mitigation - T1193",shape=ellipse];"mitre-enterprise-attack-course-of-action=Spearphishing Attachment Mitigation - T1193" -> "mitre-enterprise-attack-attack-pattern=Spearphishing Attachment - T1193" [label="mitigates",];} diff --git a/static/graphs/8f6b5ca6-263a-4ea9-98f3-afd2a3cd8119.png b/static/graphs/8f6b5ca6-263a-4ea9-98f3-afd2a3cd8119.png new file mode 100644 index 0000000..9ece284 Binary files /dev/null and b/static/graphs/8f6b5ca6-263a-4ea9-98f3-afd2a3cd8119.png differ diff --git a/static/graphs/8fa6b51a-a48d-48dc-87ec-cf0d30ad66e8 b/static/graphs/8fa6b51a-a48d-48dc-87ec-cf0d30ad66e8 new file mode 100644 index 0000000..5f6f540 --- /dev/null +++ b/static/graphs/8fa6b51a-a48d-48dc-87ec-cf0d30ad66e8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Mobef-JustFun" [label="ransomware\nMobef-JustFun",shape=box,style=filled,color=deepskyblue];"ransomware=Mobef-JustFun" -> "ransomware=Mobef" [label="similar",dir="both"];"ransomware=Mobef" [label="ransomware\nMobef",shape=box,style=filled,color=deepskyblue];"ransomware=Mobef" -> "ransomware=CryptoBit" [label="similar",dir="both"];"ransomware=CryptoBit" [label="ransomware\nCryptoBit",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8fa6b51a-a48d-48dc-87ec-cf0d30ad66e8.png b/static/graphs/8fa6b51a-a48d-48dc-87ec-cf0d30ad66e8.png new file mode 100644 index 0000000..148f06d Binary files /dev/null and b/static/graphs/8fa6b51a-a48d-48dc-87ec-cf0d30ad66e8.png differ diff --git a/static/graphs/8fb00a59-0dec-4d7f-bd53-9826b3929f39 b/static/graphs/8fb00a59-0dec-4d7f-bd53-9826b3929f39 new file mode 100644 index 0000000..91566a8 --- /dev/null +++ b/static/graphs/8fb00a59-0dec-4d7f-bd53-9826b3929f39 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Plexor" [label="tool\nPlexor",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8fb00a59-0dec-4d7f-bd53-9826b3929f39.png b/static/graphs/8fb00a59-0dec-4d7f-bd53-9826b3929f39.png new file mode 100644 index 0000000..bf5c32c Binary files /dev/null and b/static/graphs/8fb00a59-0dec-4d7f-bd53-9826b3929f39.png differ diff --git a/static/graphs/8fda8ab1-077e-43b4-9284-880921ea0b86 b/static/graphs/8fda8ab1-077e-43b4-9284-880921ea0b86 new file mode 100644 index 0000000..da01396 --- /dev/null +++ b/static/graphs/8fda8ab1-077e-43b4-9284-880921ea0b86 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Information Gathering:Sniffing" [label="rsit\nInformation Gathering:Sniffing",shape=ellipse];"rsit=Information Gathering:Sniffing" -> "mitre-enterprise-attack-attack-pattern=Network Sniffing - T1040" [label="similar",dir="both"];} diff --git a/static/graphs/8fda8ab1-077e-43b4-9284-880921ea0b86.png b/static/graphs/8fda8ab1-077e-43b4-9284-880921ea0b86.png new file mode 100644 index 0000000..f215a1b Binary files /dev/null and b/static/graphs/8fda8ab1-077e-43b4-9284-880921ea0b86.png differ diff --git a/static/graphs/8ff729d9-aee5-4b85-a59d-3f57e105be40 b/static/graphs/8ff729d9-aee5-4b85-a59d-3f57e105be40 new file mode 100644 index 0000000..a098438 --- /dev/null +++ b/static/graphs/8ff729d9-aee5-4b85-a59d-3f57e105be40 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Central Security Treatment Organization" [label="ransomware\nCentral Security Treatment Organization",shape=box,style=filled,color=deepskyblue];"ransomware=Central Security Treatment Organization" -> "ransomware=CryLocker" [label="similar",dir="both"];"ransomware=Central Security Treatment Organization" -> "malpedia=CryLocker" [label="similar",dir="both"];"ransomware=CryLocker" [label="ransomware\nCryLocker",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/8ff729d9-aee5-4b85-a59d-3f57e105be40.png b/static/graphs/8ff729d9-aee5-4b85-a59d-3f57e105be40.png new file mode 100644 index 0000000..12ef250 Binary files /dev/null and b/static/graphs/8ff729d9-aee5-4b85-a59d-3f57e105be40.png differ diff --git a/static/graphs/90124cc8-1205-4e63-83ad-5c45a110b1e6 b/static/graphs/90124cc8-1205-4e63-83ad-5c45a110b1e6 new file mode 100644 index 0000000..2b41873 --- /dev/null +++ b/static/graphs/90124cc8-1205-4e63-83ad-5c45a110b1e6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=BUGJUICE" [label="tool\nBUGJUICE",shape=box,style=filled,color=deepskyblue];"tool=BUGJUICE" -> "rat=RedLeaves" [label="similar",dir="both"];"tool=BUGJUICE" -> "mitre-enterprise-attack-malware=RedLeaves - S0153" [label="similar",dir="both"];"tool=BUGJUICE" -> "malpedia=RedLeaves" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RedLeaves - S0153" [label="mitre-enterprise-attack-malware\nRedLeaves - S0153",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RedLeaves - S0153" -> "mitre-enterprise-attack-attack-pattern=System Network Connections Discovery - T1049" [label="uses",];"rat=RedLeaves" [label="rat\nRedLeaves",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/90124cc8-1205-4e63-83ad-5c45a110b1e6.png b/static/graphs/90124cc8-1205-4e63-83ad-5c45a110b1e6.png new file mode 100644 index 0000000..6d1764d Binary files /dev/null and b/static/graphs/90124cc8-1205-4e63-83ad-5c45a110b1e6.png differ diff --git a/static/graphs/902286b2-96cc-4dd7-931f-e7340c9961da b/static/graphs/902286b2-96cc-4dd7-931f-e7340c9961da new file mode 100644 index 0000000..e4eb655 --- /dev/null +++ b/static/graphs/902286b2-96cc-4dd7-931f-e7340c9961da @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=File System Logical Offsets Mitigation - T1006" [label="mitre-enterprise-attack-course-of-action\nFile System Logical Offsets Mitigation - T1006",shape=ellipse];"mitre-enterprise-attack-course-of-action=File System Logical Offsets Mitigation - T1006" -> "mitre-enterprise-attack-attack-pattern=File System Logical Offsets - T1006" [label="mitigates",];} diff --git a/static/graphs/902286b2-96cc-4dd7-931f-e7340c9961da.png b/static/graphs/902286b2-96cc-4dd7-931f-e7340c9961da.png new file mode 100644 index 0000000..48c5433 Binary files /dev/null and b/static/graphs/902286b2-96cc-4dd7-931f-e7340c9961da.png differ diff --git a/static/graphs/90ec2b22-7061-4469-b539-0989ec4f96c2 b/static/graphs/90ec2b22-7061-4469-b539-0989ec4f96c2 new file mode 100644 index 0000000..424abd5 --- /dev/null +++ b/static/graphs/90ec2b22-7061-4469-b539-0989ec4f96c2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Forfiles - S0193" [label="mitre-enterprise-attack-tool\nForfiles - S0193",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Forfiles - S0193" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];} diff --git a/static/graphs/90ec2b22-7061-4469-b539-0989ec4f96c2.png b/static/graphs/90ec2b22-7061-4469-b539-0989ec4f96c2.png new file mode 100644 index 0000000..82b1a8b Binary files /dev/null and b/static/graphs/90ec2b22-7061-4469-b539-0989ec4f96c2.png differ diff --git a/static/graphs/90ef600f-5198-44a9-a2c6-de4b4d9d8624 b/static/graphs/90ef600f-5198-44a9-a2c6-de4b4d9d8624 new file mode 100644 index 0000000..6ad5934 --- /dev/null +++ b/static/graphs/90ef600f-5198-44a9-a2c6-de4b4d9d8624 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Berserk Bear" [label="threat-actor\nBerserk Bear",shape=octagon,style=filled,color=indianred1];"threat-actor=Berserk Bear" -> "threat-actor=TeamSpy Crew" [label="similar",dir="both"];"threat-actor=TeamSpy Crew" [label="threat-actor\nTeamSpy Crew",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/90ef600f-5198-44a9-a2c6-de4b4d9d8624.png b/static/graphs/90ef600f-5198-44a9-a2c6-de4b4d9d8624.png new file mode 100644 index 0000000..35b02eb Binary files /dev/null and b/static/graphs/90ef600f-5198-44a9-a2c6-de4b4d9d8624.png differ diff --git a/static/graphs/91000a8a-58cc-4aba-9ad0-993ad6302b86 b/static/graphs/91000a8a-58cc-4aba-9ad0-993ad6302b86 new file mode 100644 index 0000000..b555fde --- /dev/null +++ b/static/graphs/91000a8a-58cc-4aba-9ad0-993ad6302b86 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=StreamEx - S0142" [label="mitre-enterprise-attack-malware\nStreamEx - S0142",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=StreamEx - S0142" -> "tool=StreamEx" [label="similar",dir="both"];"mitre-enterprise-attack-malware=StreamEx - S0142" -> "mitre-enterprise-attack-attack-pattern=New Service - T1050" [label="uses",];"tool=StreamEx" [label="tool\nStreamEx",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/91000a8a-58cc-4aba-9ad0-993ad6302b86.png b/static/graphs/91000a8a-58cc-4aba-9ad0-993ad6302b86.png new file mode 100644 index 0000000..a766632 Binary files /dev/null and b/static/graphs/91000a8a-58cc-4aba-9ad0-993ad6302b86.png differ diff --git a/static/graphs/910482b1-6749-4934-abcb-3e34d58294fc b/static/graphs/910482b1-6749-4934-abcb-3e34d58294fc new file mode 100644 index 0000000..bfc832c --- /dev/null +++ b/static/graphs/910482b1-6749-4934-abcb-3e34d58294fc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Distributed Component Object Model Mitigation - T1175" [label="mitre-enterprise-attack-course-of-action\nDistributed Component Object Model Mitigation - T1175",shape=ellipse];"mitre-enterprise-attack-course-of-action=Distributed Component Object Model Mitigation - T1175" -> "mitre-enterprise-attack-attack-pattern=Distributed Component Object Model - T1175" [label="mitigates",];} diff --git a/static/graphs/910482b1-6749-4934-abcb-3e34d58294fc.png b/static/graphs/910482b1-6749-4934-abcb-3e34d58294fc.png new file mode 100644 index 0000000..1eab4af Binary files /dev/null and b/static/graphs/910482b1-6749-4934-abcb-3e34d58294fc.png differ diff --git a/static/graphs/91583583-95c0-444e-8175-483cbebc640b b/static/graphs/91583583-95c0-444e-8175-483cbebc640b new file mode 100644 index 0000000..65f2cf7 --- /dev/null +++ b/static/graphs/91583583-95c0-444e-8175-483cbebc640b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Etumbot" [label="tool\nEtumbot",shape=box,style=filled,color=deepskyblue];"tool=Etumbot" -> "mitre-enterprise-attack-malware=RIPTIDE - S0003" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RIPTIDE - S0003" [label="mitre-enterprise-attack-malware\nRIPTIDE - S0003",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RIPTIDE - S0003" -> "mitre-enterprise-attack-attack-pattern=Commonly Used Port - T1043" [label="uses",];} diff --git a/static/graphs/91583583-95c0-444e-8175-483cbebc640b.png b/static/graphs/91583583-95c0-444e-8175-483cbebc640b.png new file mode 100644 index 0000000..b8980ae Binary files /dev/null and b/static/graphs/91583583-95c0-444e-8175-483cbebc640b.png differ diff --git a/static/graphs/91816292-3686-4a6e-83c4-4c08513b9b57 b/static/graphs/91816292-3686-4a6e-83c4-4c08513b9b57 new file mode 100644 index 0000000..84d449f --- /dev/null +++ b/static/graphs/91816292-3686-4a6e-83c4-4c08513b9b57 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=CMSTP Mitigation - T1191" [label="mitre-enterprise-attack-course-of-action\nCMSTP Mitigation - T1191",shape=ellipse];"mitre-enterprise-attack-course-of-action=CMSTP Mitigation - T1191" -> "mitre-enterprise-attack-attack-pattern=CMSTP - T1191" [label="mitigates",];} diff --git a/static/graphs/91816292-3686-4a6e-83c4-4c08513b9b57.png b/static/graphs/91816292-3686-4a6e-83c4-4c08513b9b57.png new file mode 100644 index 0000000..213db4f Binary files /dev/null and b/static/graphs/91816292-3686-4a6e-83c4-4c08513b9b57.png differ diff --git a/static/graphs/9223bf17-7e32-4833-9574-9ffd8c929765 b/static/graphs/9223bf17-7e32-4833-9574-9ffd8c929765 new file mode 100644 index 0000000..dd06baa --- /dev/null +++ b/static/graphs/9223bf17-7e32-4833-9574-9ffd8c929765 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=ComRAT" [label="rat\nComRAT",shape=box,style=filled,color=deepskyblue];"rat=ComRAT" -> "mitre-enterprise-attack-malware=ComRAT - S0126" [label="similar",dir="both"];"rat=ComRAT" -> "malpedia=Agent.BTZ" [label="similar",dir="both"];"rat=ComRAT" -> "tool=Agent.BTZ" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ComRAT - S0126" [label="mitre-enterprise-attack-malware\nComRAT - S0126",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ComRAT - S0126" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=Agent.BTZ" [label="tool\nAgent.BTZ",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/9223bf17-7e32-4833-9574-9ffd8c929765.png b/static/graphs/9223bf17-7e32-4833-9574-9ffd8c929765.png new file mode 100644 index 0000000..bc4ca7e Binary files /dev/null and b/static/graphs/9223bf17-7e32-4833-9574-9ffd8c929765.png differ diff --git a/static/graphs/92c28497-2820-445e-9f3e-a03dd77dc0c8 b/static/graphs/92c28497-2820-445e-9f3e-a03dd77dc0c8 new file mode 100644 index 0000000..da1bef9 --- /dev/null +++ b/static/graphs/92c28497-2820-445e-9f3e-a03dd77dc0c8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Exfiltration Over Command and Control Channel Mitigation - T1041" [label="mitre-enterprise-attack-course-of-action\nExfiltration Over Command and Control Channel Mitigation - T1041",shape=ellipse];"mitre-enterprise-attack-course-of-action=Exfiltration Over Command and Control Channel Mitigation - T1041" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Command and Control Channel - T1041" [label="mitigates",];} diff --git a/static/graphs/92c28497-2820-445e-9f3e-a03dd77dc0c8.png b/static/graphs/92c28497-2820-445e-9f3e-a03dd77dc0c8.png new file mode 100644 index 0000000..a90d994 Binary files /dev/null and b/static/graphs/92c28497-2820-445e-9f3e-a03dd77dc0c8.png differ diff --git a/static/graphs/92e6d080-ca3f-4f95-bc45-172a32c4e502 b/static/graphs/92e6d080-ca3f-4f95-bc45-172a32c4e502 new file mode 100644 index 0000000..d5101ce --- /dev/null +++ b/static/graphs/92e6d080-ca3f-4f95-bc45-172a32c4e502 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Exploitation for Privilege Escalation Mitigation - T1068" [label="mitre-enterprise-attack-course-of-action\nExploitation for Privilege Escalation Mitigation - T1068",shape=ellipse];"mitre-enterprise-attack-course-of-action=Exploitation for Privilege Escalation Mitigation - T1068" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Privilege Escalation - T1068" [label="mitigates",];} diff --git a/static/graphs/92e6d080-ca3f-4f95-bc45-172a32c4e502.png b/static/graphs/92e6d080-ca3f-4f95-bc45-172a32c4e502.png new file mode 100644 index 0000000..75f37e0 Binary files /dev/null and b/static/graphs/92e6d080-ca3f-4f95-bc45-172a32c4e502.png differ diff --git a/static/graphs/92ec0cbd-2c30-44a2-b270-73f4ec949841 b/static/graphs/92ec0cbd-2c30-44a2-b270-73f4ec949841 new file mode 100644 index 0000000..5294a75 --- /dev/null +++ b/static/graphs/92ec0cbd-2c30-44a2-b270-73f4ec949841 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=RTM - S0148" [label="mitre-enterprise-attack-malware\nRTM - S0148",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RTM - S0148" -> "malpedia=RTM" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RTM - S0148" -> "mitre-enterprise-attack-attack-pattern=Install Root Certificate - T1130" [label="uses",];} diff --git a/static/graphs/92ec0cbd-2c30-44a2-b270-73f4ec949841.png b/static/graphs/92ec0cbd-2c30-44a2-b270-73f4ec949841.png new file mode 100644 index 0000000..39317f5 Binary files /dev/null and b/static/graphs/92ec0cbd-2c30-44a2-b270-73f4ec949841.png differ diff --git a/static/graphs/92f38212-94e2-4d70-9b5e-e977eb1e7b79 b/static/graphs/92f38212-94e2-4d70-9b5e-e977eb1e7b79 new file mode 100644 index 0000000..9326b15 --- /dev/null +++ b/static/graphs/92f38212-94e2-4d70-9b5e-e977eb1e7b79 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Torii" [label="botnet\nTorii",shape=box,style=filled,color=deepskyblue];"botnet=Torii" -> "malpedia=Torii" [label="similar",dir="both"];} diff --git a/static/graphs/92f38212-94e2-4d70-9b5e-e977eb1e7b79.png b/static/graphs/92f38212-94e2-4d70-9b5e-e977eb1e7b79.png new file mode 100644 index 0000000..7a1fba9 Binary files /dev/null and b/static/graphs/92f38212-94e2-4d70-9b5e-e977eb1e7b79.png differ diff --git a/static/graphs/936be60d-90eb-4c36-9247-4b31128432c4 b/static/graphs/936be60d-90eb-4c36-9247-4b31128432c4 new file mode 100644 index 0000000..1c6fb4c --- /dev/null +++ b/static/graphs/936be60d-90eb-4c36-9247-4b31128432c4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=RuMMS - MOB-S0029" [label="mitre-mobile-attack-malware\nRuMMS - MOB-S0029",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=RuMMS - MOB-S0029" -> "mitre-mobile-attack-attack-pattern=Local Network Configuration Discovery - MOB-T1025" [label="uses",];} diff --git a/static/graphs/936be60d-90eb-4c36-9247-4b31128432c4.png b/static/graphs/936be60d-90eb-4c36-9247-4b31128432c4.png new file mode 100644 index 0000000..660ab29 Binary files /dev/null and b/static/graphs/936be60d-90eb-4c36-9247-4b31128432c4.png differ diff --git a/static/graphs/9378f139-10ef-4e4b-b679-2255a0818902 b/static/graphs/9378f139-10ef-4e4b-b679-2255a0818902 new file mode 100644 index 0000000..21ad6f4 --- /dev/null +++ b/static/graphs/9378f139-10ef-4e4b-b679-2255a0818902 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Service Registry Permissions Weakness Mitigation - T1058" [label="mitre-enterprise-attack-course-of-action\nService Registry Permissions Weakness Mitigation - T1058",shape=ellipse];"mitre-enterprise-attack-course-of-action=Service Registry Permissions Weakness Mitigation - T1058" -> "mitre-enterprise-attack-attack-pattern=Service Registry Permissions Weakness - T1058" [label="mitigates",];} diff --git a/static/graphs/9378f139-10ef-4e4b-b679-2255a0818902.png b/static/graphs/9378f139-10ef-4e4b-b679-2255a0818902.png new file mode 100644 index 0000000..8de52e4 Binary files /dev/null and b/static/graphs/9378f139-10ef-4e4b-b679-2255a0818902.png differ diff --git a/static/graphs/93799a9d-3537-43d8-b6f4-17215de1657c b/static/graphs/93799a9d-3537-43d8-b6f4-17215de1657c new file mode 100644 index 0000000..1680e6d --- /dev/null +++ b/static/graphs/93799a9d-3537-43d8-b6f4-17215de1657c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=Pegasus for Android - MOB-S0032" [label="mitre-mobile-attack-malware\nPegasus for Android - MOB-S0032",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Pegasus for Android - MOB-S0032" -> "tool=Chrysaor" [label="similar",dir="both"];"mitre-mobile-attack-malware=Pegasus for Android - MOB-S0032" -> "malpedia=Chrysaor" [label="similar",dir="both"];"mitre-mobile-attack-malware=Pegasus for Android - MOB-S0032" -> "mitre-mobile-attack-attack-pattern=Application Discovery - MOB-T1021" [label="uses",];"tool=Chrysaor" [label="tool\nChrysaor",shape=box,style=filled,color=deepskyblue];"tool=Chrysaor" -> "mitre-mobile-attack-malware=Pegasus - MOB-S0005" [label="similar",dir="both"];"mitre-mobile-attack-malware=Pegasus - MOB-S0005" [label="mitre-mobile-attack-malware\nPegasus - MOB-S0005",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Pegasus - MOB-S0005" -> "mitre-mobile-attack-attack-pattern=Capture SMS Messages - MOB-T1015" [label="uses",];"mitre-mobile-attack-malware=Pegasus - MOB-S0005" -> "mitre-mobile-attack-attack-pattern=Exploit OS Vulnerability - MOB-T1007" [label="uses",];} diff --git a/static/graphs/93799a9d-3537-43d8-b6f4-17215de1657c.png b/static/graphs/93799a9d-3537-43d8-b6f4-17215de1657c.png new file mode 100644 index 0000000..de33c8f Binary files /dev/null and b/static/graphs/93799a9d-3537-43d8-b6f4-17215de1657c.png differ diff --git a/static/graphs/93f52415-0fe4-4d3d-896c-fc9b8e88ab90 b/static/graphs/93f52415-0fe4-4d3d-896c-fc9b8e88ab90 new file mode 100644 index 0000000..b825ee5 --- /dev/null +++ b/static/graphs/93f52415-0fe4-4d3d-896c-fc9b8e88ab90 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=BRONZE BUTLER - G0060" [label="mitre-enterprise-attack-intrusion-set\nBRONZE BUTLER - G0060",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=BRONZE BUTLER - G0060" -> "threat-actor=Tick" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=BRONZE BUTLER - G0060" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];"threat-actor=Tick" [label="threat-actor\nTick",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/93f52415-0fe4-4d3d-896c-fc9b8e88ab90.png b/static/graphs/93f52415-0fe4-4d3d-896c-fc9b8e88ab90.png new file mode 100644 index 0000000..6367ab1 Binary files /dev/null and b/static/graphs/93f52415-0fe4-4d3d-896c-fc9b8e88ab90.png differ diff --git a/static/graphs/94379dec-5c87-49db-b36e-66abc0b81344 b/static/graphs/94379dec-5c87-49db-b36e-66abc0b81344 new file mode 100644 index 0000000..0abadf1 --- /dev/null +++ b/static/graphs/94379dec-5c87-49db-b36e-66abc0b81344 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Derusbi - S0021" [label="mitre-enterprise-attack-malware\nDerusbi - S0021",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Derusbi - S0021" -> "tool=Derusbi" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Derusbi - S0021" -> "malpedia=Derusbi (Windows)" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Derusbi - S0021" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];"tool=Derusbi" [label="tool\nDerusbi",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/94379dec-5c87-49db-b36e-66abc0b81344.png b/static/graphs/94379dec-5c87-49db-b36e-66abc0b81344.png new file mode 100644 index 0000000..d2d91d2 Binary files /dev/null and b/static/graphs/94379dec-5c87-49db-b36e-66abc0b81344.png differ diff --git a/static/graphs/943d370b-2054-44df-8be2-ab4139bde1c5 b/static/graphs/943d370b-2054-44df-8be2-ab4139bde1c5 new file mode 100644 index 0000000..628b877 --- /dev/null +++ b/static/graphs/943d370b-2054-44df-8be2-ab4139bde1c5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Authentication Package Mitigation - T1131" [label="mitre-enterprise-attack-course-of-action\nAuthentication Package Mitigation - T1131",shape=ellipse];"mitre-enterprise-attack-course-of-action=Authentication Package Mitigation - T1131" -> "mitre-enterprise-attack-attack-pattern=Authentication Package - T1131" [label="mitigates",];} diff --git a/static/graphs/943d370b-2054-44df-8be2-ab4139bde1c5.png b/static/graphs/943d370b-2054-44df-8be2-ab4139bde1c5.png new file mode 100644 index 0000000..a565b3c Binary files /dev/null and b/static/graphs/943d370b-2054-44df-8be2-ab4139bde1c5.png differ diff --git a/static/graphs/94927849-03e3-4a07-8f4c-9ee21b626719 b/static/graphs/94927849-03e3-4a07-8f4c-9ee21b626719 new file mode 100644 index 0000000..ad9db37 --- /dev/null +++ b/static/graphs/94927849-03e3-4a07-8f4c-9ee21b626719 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Startup Items Mitigation - T1165" [label="mitre-enterprise-attack-course-of-action\nStartup Items Mitigation - T1165",shape=ellipse];"mitre-enterprise-attack-course-of-action=Startup Items Mitigation - T1165" -> "mitre-enterprise-attack-attack-pattern=Startup Items - T1165" [label="mitigates",];} diff --git a/static/graphs/94927849-03e3-4a07-8f4c-9ee21b626719.png b/static/graphs/94927849-03e3-4a07-8f4c-9ee21b626719.png new file mode 100644 index 0000000..db32f0b Binary files /dev/null and b/static/graphs/94927849-03e3-4a07-8f4c-9ee21b626719.png differ diff --git a/static/graphs/94d12a03-6ae8-4006-a98f-80c15e6f95c0 b/static/graphs/94d12a03-6ae8-4006-a98f-80c15e6f95c0 new file mode 100644 index 0000000..5bdf31b --- /dev/null +++ b/static/graphs/94d12a03-6ae8-4006-a98f-80c15e6f95c0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Pushdo" [label="botnet\nPushdo",shape=box,style=filled,color=deepskyblue];"botnet=Pushdo" -> "malpedia=Pushdo" [label="similar",dir="both"];} diff --git a/static/graphs/94d12a03-6ae8-4006-a98f-80c15e6f95c0.png b/static/graphs/94d12a03-6ae8-4006-a98f-80c15e6f95c0.png new file mode 100644 index 0000000..254c724 Binary files /dev/null and b/static/graphs/94d12a03-6ae8-4006-a98f-80c15e6f95c0.png differ diff --git a/static/graphs/94e95eeb-7cdb-4bd7-afba-f32fda303dbb b/static/graphs/94e95eeb-7cdb-4bd7-afba-f32fda303dbb new file mode 100644 index 0000000..bfbb48e --- /dev/null +++ b/static/graphs/94e95eeb-7cdb-4bd7-afba-f32fda303dbb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Network Share Connection Removal Mitigation - T1126" [label="mitre-enterprise-attack-course-of-action\nNetwork Share Connection Removal Mitigation - T1126",shape=ellipse];"mitre-enterprise-attack-course-of-action=Network Share Connection Removal Mitigation - T1126" -> "mitre-enterprise-attack-attack-pattern=Network Share Connection Removal - T1126" [label="mitigates",];} diff --git a/static/graphs/94e95eeb-7cdb-4bd7-afba-f32fda303dbb.png b/static/graphs/94e95eeb-7cdb-4bd7-afba-f32fda303dbb.png new file mode 100644 index 0000000..dc46009 Binary files /dev/null and b/static/graphs/94e95eeb-7cdb-4bd7-afba-f32fda303dbb.png differ diff --git a/static/graphs/94f6b4f5-b528-4f50-91d5-f66457c2f8f7 b/static/graphs/94f6b4f5-b528-4f50-91d5-f66457c2f8f7 new file mode 100644 index 0000000..6f74b7a --- /dev/null +++ b/static/graphs/94f6b4f5-b528-4f50-91d5-f66457c2f8f7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Man in the Browser Mitigation - T1185" [label="mitre-enterprise-attack-course-of-action\nMan in the Browser Mitigation - T1185",shape=ellipse];"mitre-enterprise-attack-course-of-action=Man in the Browser Mitigation - T1185" -> "mitre-enterprise-attack-attack-pattern=Man in the Browser - T1185" [label="mitigates",];} diff --git a/static/graphs/94f6b4f5-b528-4f50-91d5-f66457c2f8f7.png b/static/graphs/94f6b4f5-b528-4f50-91d5-f66457c2f8f7.png new file mode 100644 index 0000000..018dd82 Binary files /dev/null and b/static/graphs/94f6b4f5-b528-4f50-91d5-f66457c2f8f7.png differ diff --git a/static/graphs/95047f03-4811-4300-922e-1ba937d53a61 b/static/graphs/95047f03-4811-4300-922e-1ba937d53a61 new file mode 100644 index 0000000..4c06c1e --- /dev/null +++ b/static/graphs/95047f03-4811-4300-922e-1ba937d53a61 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Hikit - S0009" [label="mitre-enterprise-attack-malware\nHikit - S0009",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Hikit - S0009" -> "tool=Hikit" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Hikit - S0009" -> "mitre-enterprise-attack-attack-pattern=Connection Proxy - T1090" [label="uses",];"tool=Hikit" [label="tool\nHikit",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/95047f03-4811-4300-922e-1ba937d53a61.png b/static/graphs/95047f03-4811-4300-922e-1ba937d53a61.png new file mode 100644 index 0000000..d6fa7a5 Binary files /dev/null and b/static/graphs/95047f03-4811-4300-922e-1ba937d53a61.png differ diff --git a/static/graphs/95174297-6dff-47d9-bcb9-263f9b2efcfb b/static/graphs/95174297-6dff-47d9-bcb9-263f9b2efcfb new file mode 100644 index 0000000..58a401c --- /dev/null +++ b/static/graphs/95174297-6dff-47d9-bcb9-263f9b2efcfb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Exaramel" [label="tool\nExaramel",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/95174297-6dff-47d9-bcb9-263f9b2efcfb.png b/static/graphs/95174297-6dff-47d9-bcb9-263f9b2efcfb.png new file mode 100644 index 0000000..739a282 Binary files /dev/null and b/static/graphs/95174297-6dff-47d9-bcb9-263f9b2efcfb.png differ diff --git a/static/graphs/9559ecaf-2e75-48a7-aee8-9974020bc772 b/static/graphs/9559ecaf-2e75-48a7-aee8-9974020bc772 new file mode 100644 index 0000000..8228632 --- /dev/null +++ b/static/graphs/9559ecaf-2e75-48a7-aee8-9974020bc772 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=MONSOON - G0042" [label="mitre-enterprise-attack-intrusion-set\nMONSOON - G0042",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=MONSOON - G0042" -> "mitre-enterprise-attack-intrusion-set=Patchwork - G0040" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=MONSOON - G0042" -> "threat-actor=Dropping Elephant" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Patchwork - G0040" [label="mitre-enterprise-attack-intrusion-set\nPatchwork - G0040",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Patchwork - G0040" -> "mitre-enterprise-attack-attack-pattern=Data Encoding - T1132" [label="uses",];"threat-actor=Dropping Elephant" [label="threat-actor\nDropping Elephant",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/9559ecaf-2e75-48a7-aee8-9974020bc772.png b/static/graphs/9559ecaf-2e75-48a7-aee8-9974020bc772.png new file mode 100644 index 0000000..5a7d792 Binary files /dev/null and b/static/graphs/9559ecaf-2e75-48a7-aee8-9974020bc772.png differ diff --git a/static/graphs/95be4cd8-1d98-484f-a328-a5917a05e3c8 b/static/graphs/95be4cd8-1d98-484f-a328-a5917a05e3c8 new file mode 100644 index 0000000..49f8af3 --- /dev/null +++ b/static/graphs/95be4cd8-1d98-484f-a328-a5917a05e3c8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=HDDCryptor" [label="ransomware\nHDDCryptor",shape=box,style=filled,color=deepskyblue];"ransomware=HDDCryptor" -> "malpedia=Mamba" [label="similar",dir="both"];} diff --git a/static/graphs/95be4cd8-1d98-484f-a328-a5917a05e3c8.png b/static/graphs/95be4cd8-1d98-484f-a328-a5917a05e3c8.png new file mode 100644 index 0000000..5b6159b Binary files /dev/null and b/static/graphs/95be4cd8-1d98-484f-a328-a5917a05e3c8.png differ diff --git a/static/graphs/95c29444-49f9-49f7-8b20-bcd68d8fcaa6 b/static/graphs/95c29444-49f9-49f7-8b20-bcd68d8fcaa6 new file mode 100644 index 0000000..eb428ca --- /dev/null +++ b/static/graphs/95c29444-49f9-49f7-8b20-bcd68d8fcaa6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=AppCert DLLs Mitigation - T1182" [label="mitre-enterprise-attack-course-of-action\nAppCert DLLs Mitigation - T1182",shape=ellipse];"mitre-enterprise-attack-course-of-action=AppCert DLLs Mitigation - T1182" -> "mitre-enterprise-attack-attack-pattern=AppCert DLLs - T1182" [label="mitigates",];} diff --git a/static/graphs/95c29444-49f9-49f7-8b20-bcd68d8fcaa6.png b/static/graphs/95c29444-49f9-49f7-8b20-bcd68d8fcaa6.png new file mode 100644 index 0000000..d73538b Binary files /dev/null and b/static/graphs/95c29444-49f9-49f7-8b20-bcd68d8fcaa6.png differ diff --git a/static/graphs/95ddb356-7ba0-4bd9-a889-247262b8946f b/static/graphs/95ddb356-7ba0-4bd9-a889-247262b8946f new file mode 100644 index 0000000..c9283cf --- /dev/null +++ b/static/graphs/95ddb356-7ba0-4bd9-a889-247262b8946f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Rootkit Mitigation - T1014" [label="mitre-enterprise-attack-course-of-action\nRootkit Mitigation - T1014",shape=ellipse];"mitre-enterprise-attack-course-of-action=Rootkit Mitigation - T1014" -> "mitre-enterprise-attack-attack-pattern=Rootkit - T1014" [label="mitigates",];} diff --git a/static/graphs/95ddb356-7ba0-4bd9-a889-247262b8946f.png b/static/graphs/95ddb356-7ba0-4bd9-a889-247262b8946f.png new file mode 100644 index 0000000..d4ace2b Binary files /dev/null and b/static/graphs/95ddb356-7ba0-4bd9-a889-247262b8946f.png differ diff --git a/static/graphs/96150c35-466f-4f0a-97a9-ae87ee27f751 b/static/graphs/96150c35-466f-4f0a-97a9-ae87ee27f751 new file mode 100644 index 0000000..0c5992b --- /dev/null +++ b/static/graphs/96150c35-466f-4f0a-97a9-ae87ee27f751 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Bootkit Mitigation - T1067" [label="mitre-enterprise-attack-course-of-action\nBootkit Mitigation - T1067",shape=ellipse];"mitre-enterprise-attack-course-of-action=Bootkit Mitigation - T1067" -> "mitre-enterprise-attack-attack-pattern=Bootkit - T1067" [label="mitigates",];} diff --git a/static/graphs/96150c35-466f-4f0a-97a9-ae87ee27f751.png b/static/graphs/96150c35-466f-4f0a-97a9-ae87ee27f751.png new file mode 100644 index 0000000..85e8263 Binary files /dev/null and b/static/graphs/96150c35-466f-4f0a-97a9-ae87ee27f751.png differ diff --git a/static/graphs/96566860-9f11-4b6f-964d-1c924e4f24a4 b/static/graphs/96566860-9f11-4b6f-964d-1c924e4f24a4 new file mode 100644 index 0000000..9470f79 --- /dev/null +++ b/static/graphs/96566860-9f11-4b6f-964d-1c924e4f24a4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Starloader - S0188" [label="mitre-enterprise-attack-malware\nStarloader - S0188",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Starloader - S0188" -> "mitre-enterprise-attack-attack-pattern=Deobfuscate/Decode Files or Information - T1140" [label="uses",];} diff --git a/static/graphs/96566860-9f11-4b6f-964d-1c924e4f24a4.png b/static/graphs/96566860-9f11-4b6f-964d-1c924e4f24a4.png new file mode 100644 index 0000000..dea8ba2 Binary files /dev/null and b/static/graphs/96566860-9f11-4b6f-964d-1c924e4f24a4.png differ diff --git a/static/graphs/968df869-7f60-4420-989f-23dfdbd58668 b/static/graphs/968df869-7f60-4420-989f-23dfdbd58668 new file mode 100644 index 0000000..4ef472f --- /dev/null +++ b/static/graphs/968df869-7f60-4420-989f-23dfdbd58668 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Fireball" [label="tool\nFireball",shape=box,style=filled,color=deepskyblue];"tool=Fireball" -> "malpedia=Fireball" [label="similar",dir="both"];} diff --git a/static/graphs/968df869-7f60-4420-989f-23dfdbd58668.png b/static/graphs/968df869-7f60-4420-989f-23dfdbd58668.png new file mode 100644 index 0000000..900f43e Binary files /dev/null and b/static/graphs/968df869-7f60-4420-989f-23dfdbd58668.png differ diff --git a/static/graphs/96913243-2b5e-4483-a65c-bb152ddd2f04 b/static/graphs/96913243-2b5e-4483-a65c-bb152ddd2f04 new file mode 100644 index 0000000..9649cd0 --- /dev/null +++ b/static/graphs/96913243-2b5e-4483-a65c-bb152ddd2f04 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=DLL Search Order Hijacking Mitigation - T1038" [label="mitre-enterprise-attack-course-of-action\nDLL Search Order Hijacking Mitigation - T1038",shape=ellipse];"mitre-enterprise-attack-course-of-action=DLL Search Order Hijacking Mitigation - T1038" -> "mitre-enterprise-attack-attack-pattern=DLL Search Order Hijacking - T1038" [label="mitigates",];} diff --git a/static/graphs/96913243-2b5e-4483-a65c-bb152ddd2f04.png b/static/graphs/96913243-2b5e-4483-a65c-bb152ddd2f04.png new file mode 100644 index 0000000..5f5a0aa Binary files /dev/null and b/static/graphs/96913243-2b5e-4483-a65c-bb152ddd2f04.png differ diff --git a/static/graphs/96b08451-b27a-4ff6-893f-790e26393a8e b/static/graphs/96b08451-b27a-4ff6-893f-790e26393a8e new file mode 100644 index 0000000..bd46074 --- /dev/null +++ b/static/graphs/96b08451-b27a-4ff6-893f-790e26393a8e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Sakula - S0074" [label="mitre-enterprise-attack-malware\nSakula - S0074",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Sakula - S0074" -> "rat=Sakula" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Sakula - S0074" -> "tool=Sakula" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Sakula - S0074" -> "malpedia=Sakula RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Sakula - S0074" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];"rat=Sakula" [label="rat\nSakula",shape=box,style=filled,color=deepskyblue];"tool=Sakula" [label="tool\nSakula",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/96b08451-b27a-4ff6-893f-790e26393a8e.png b/static/graphs/96b08451-b27a-4ff6-893f-790e26393a8e.png new file mode 100644 index 0000000..9729ece Binary files /dev/null and b/static/graphs/96b08451-b27a-4ff6-893f-790e26393a8e.png differ diff --git a/static/graphs/96b2b31e-b191-43c4-9929-48ba1cbee62c b/static/graphs/96b2b31e-b191-43c4-9929-48ba1cbee62c new file mode 100644 index 0000000..4333adf --- /dev/null +++ b/static/graphs/96b2b31e-b191-43c4-9929-48ba1cbee62c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"exploit-kit=Hunter" [label="exploit-kit\nHunter",shape=box,style=filled,color=deepskyblue];"exploit-kit=Hunter" -> "tool=Tinba" [label="similar",dir="both"];"tool=Tinba" [label="tool\nTinba",shape=box,style=filled,color=deepskyblue];"tool=Tinba" -> "banker=Tinba" [label="similar",dir="both"];"tool=Tinba" -> "malpedia=Tinba" [label="similar",dir="both"];"banker=Tinba" [label="banker\nTinba",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/96b2b31e-b191-43c4-9929-48ba1cbee62c.png b/static/graphs/96b2b31e-b191-43c4-9929-48ba1cbee62c.png new file mode 100644 index 0000000..4335011 Binary files /dev/null and b/static/graphs/96b2b31e-b191-43c4-9929-48ba1cbee62c.png differ diff --git a/static/graphs/96e239be-ad99-49eb-b127-3007b8c1bec9 b/static/graphs/96e239be-ad99-49eb-b127-3007b8c1bec9 new file mode 100644 index 0000000..b1feab8 --- /dev/null +++ b/static/graphs/96e239be-ad99-49eb-b127-3007b8c1bec9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Equation - G0020" [label="mitre-enterprise-attack-intrusion-set\nEquation - G0020",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Equation - G0020" -> "mitre-enterprise-attack-attack-pattern=Component Firmware - T1109" [label="uses",];} diff --git a/static/graphs/96e239be-ad99-49eb-b127-3007b8c1bec9.png b/static/graphs/96e239be-ad99-49eb-b127-3007b8c1bec9.png new file mode 100644 index 0000000..be52aa1 Binary files /dev/null and b/static/graphs/96e239be-ad99-49eb-b127-3007b8c1bec9.png differ diff --git a/static/graphs/96eb59d1-6c46-44bb-bfcd-56be02a00d41 b/static/graphs/96eb59d1-6c46-44bb-bfcd-56be02a00d41 new file mode 100644 index 0000000..882f31d --- /dev/null +++ b/static/graphs/96eb59d1-6c46-44bb-bfcd-56be02a00d41 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" [label="mitre-pre-attack-attack-pattern\nAnalyze organizational skillsets and deficiencies - PRE-T1074",shape=ellipse];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1066" [label="related-to",];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1077" [label="related-to",];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1077" [label="mitre-pre-attack-attack-pattern\nAnalyze organizational skillsets and deficiencies - PRE-T1077",shape=ellipse];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1077" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" [label="related-to",];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1066" [label="mitre-pre-attack-attack-pattern\nAnalyze organizational skillsets and deficiencies - PRE-T1066",shape=ellipse];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1066" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1074" [label="related-to",];"mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1066" -> "mitre-pre-attack-attack-pattern=Analyze organizational skillsets and deficiencies - PRE-T1077" [label="related-to",];} diff --git a/static/graphs/96eb59d1-6c46-44bb-bfcd-56be02a00d41.png b/static/graphs/96eb59d1-6c46-44bb-bfcd-56be02a00d41.png new file mode 100644 index 0000000..0a77ad8 Binary files /dev/null and b/static/graphs/96eb59d1-6c46-44bb-bfcd-56be02a00d41.png differ diff --git a/static/graphs/96fd6cc4-a693-4118-83ec-619e5352d07d b/static/graphs/96fd6cc4-a693-4118-83ec-619e5352d07d new file mode 100644 index 0000000..fbf7b35 --- /dev/null +++ b/static/graphs/96fd6cc4-a693-4118-83ec-619e5352d07d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Winexe - S0191" [label="mitre-enterprise-attack-tool\nWinexe - S0191",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Winexe - S0191" -> "tool=Winexe" [label="similar",dir="both"];"mitre-enterprise-attack-tool=Winexe - S0191" -> "mitre-enterprise-attack-attack-pattern=Service Execution - T1035" [label="uses",];"tool=Winexe" [label="tool\nWinexe",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/96fd6cc4-a693-4118-83ec-619e5352d07d.png b/static/graphs/96fd6cc4-a693-4118-83ec-619e5352d07d.png new file mode 100644 index 0000000..041c7d4 Binary files /dev/null and b/static/graphs/96fd6cc4-a693-4118-83ec-619e5352d07d.png differ diff --git a/static/graphs/9752aef4-a1f3-4328-929f-b64eb0536090 b/static/graphs/9752aef4-a1f3-4328-929f-b64eb0536090 new file mode 100644 index 0000000..4c1b850 --- /dev/null +++ b/static/graphs/9752aef4-a1f3-4328-929f-b64eb0536090 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=RawPOS - S0169" [label="mitre-enterprise-attack-malware\nRawPOS - S0169",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RawPOS - S0169" -> "malpedia=RawPOS" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RawPOS - S0169" -> "mitre-enterprise-attack-attack-pattern=Data Staged - T1074" [label="uses",];} diff --git a/static/graphs/9752aef4-a1f3-4328-929f-b64eb0536090.png b/static/graphs/9752aef4-a1f3-4328-929f-b64eb0536090.png new file mode 100644 index 0000000..9440b29 Binary files /dev/null and b/static/graphs/9752aef4-a1f3-4328-929f-b64eb0536090.png differ diff --git a/static/graphs/979e6485-7a2f-42bd-ae96-4e622c3cd173 b/static/graphs/979e6485-7a2f-42bd-ae96-4e622c3cd173 new file mode 100644 index 0000000..6a15677 --- /dev/null +++ b/static/graphs/979e6485-7a2f-42bd-ae96-4e622c3cd173 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Remote Services Mitigation - T1021" [label="mitre-enterprise-attack-course-of-action\nRemote Services Mitigation - T1021",shape=ellipse];"mitre-enterprise-attack-course-of-action=Remote Services Mitigation - T1021" -> "mitre-enterprise-attack-attack-pattern=Remote Services - T1021" [label="mitigates",];} diff --git a/static/graphs/979e6485-7a2f-42bd-ae96-4e622c3cd173.png b/static/graphs/979e6485-7a2f-42bd-ae96-4e622c3cd173.png new file mode 100644 index 0000000..474cb1e Binary files /dev/null and b/static/graphs/979e6485-7a2f-42bd-ae96-4e622c3cd173.png differ diff --git a/static/graphs/97d34770-44cc-4ecb-bdce-ba11581c0e2a b/static/graphs/97d34770-44cc-4ecb-bdce-ba11581c0e2a new file mode 100644 index 0000000..7f7d10a --- /dev/null +++ b/static/graphs/97d34770-44cc-4ecb-bdce-ba11581c0e2a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Necurs" [label="tool\nNecurs",shape=box,style=filled,color=deepskyblue];"tool=Necurs" -> "malpedia=Necurs" [label="similar",dir="both"];} diff --git a/static/graphs/97d34770-44cc-4ecb-bdce-ba11581c0e2a.png b/static/graphs/97d34770-44cc-4ecb-bdce-ba11581c0e2a.png new file mode 100644 index 0000000..06837c1 Binary files /dev/null and b/static/graphs/97d34770-44cc-4ecb-bdce-ba11581c0e2a.png differ diff --git a/static/graphs/97d8eadb-0459-4c1d-bf1a-e053bd75df61 b/static/graphs/97d8eadb-0459-4c1d-bf1a-e053bd75df61 new file mode 100644 index 0000000..39340fe --- /dev/null +++ b/static/graphs/97d8eadb-0459-4c1d-bf1a-e053bd75df61 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Supply Chain Compromise Mitigation - T1195" [label="mitre-enterprise-attack-course-of-action\nSupply Chain Compromise Mitigation - T1195",shape=ellipse];"mitre-enterprise-attack-course-of-action=Supply Chain Compromise Mitigation - T1195" -> "mitre-enterprise-attack-attack-pattern=Supply Chain Compromise - T1195" [label="mitigates",];} diff --git a/static/graphs/97d8eadb-0459-4c1d-bf1a-e053bd75df61.png b/static/graphs/97d8eadb-0459-4c1d-bf1a-e053bd75df61.png new file mode 100644 index 0000000..e19bd6a Binary files /dev/null and b/static/graphs/97d8eadb-0459-4c1d-bf1a-e053bd75df61.png differ diff --git a/static/graphs/97f26fab-af0e-4da9-b4c1-aec70cace22d b/static/graphs/97f26fab-af0e-4da9-b4c1-aec70cace22d new file mode 100644 index 0000000..a28b162 --- /dev/null +++ b/static/graphs/97f26fab-af0e-4da9-b4c1-aec70cace22d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Cobalt Strike" [label="tool\nCobalt Strike",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/97f26fab-af0e-4da9-b4c1-aec70cace22d.png b/static/graphs/97f26fab-af0e-4da9-b4c1-aec70cace22d.png new file mode 100644 index 0000000..97a8ebb Binary files /dev/null and b/static/graphs/97f26fab-af0e-4da9-b4c1-aec70cace22d.png differ diff --git a/static/graphs/98e8a977-3416-43aa-87fa-33e287e9c14c b/static/graphs/98e8a977-3416-43aa-87fa-33e287e9c14c new file mode 100644 index 0000000..6ed1898 --- /dev/null +++ b/static/graphs/98e8a977-3416-43aa-87fa-33e287e9c14c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=WINDSHIELD - S0155" [label="mitre-enterprise-attack-malware\nWINDSHIELD - S0155",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=WINDSHIELD - S0155" -> "mitre-enterprise-attack-attack-pattern=System Information Discovery - T1082" [label="uses",];} diff --git a/static/graphs/98e8a977-3416-43aa-87fa-33e287e9c14c.png b/static/graphs/98e8a977-3416-43aa-87fa-33e287e9c14c.png new file mode 100644 index 0000000..f493b99 Binary files /dev/null and b/static/graphs/98e8a977-3416-43aa-87fa-33e287e9c14c.png differ diff --git a/static/graphs/99784b80-6298-45ba-885c-0ed37bfd8324 b/static/graphs/99784b80-6298-45ba-885c-0ed37bfd8324 new file mode 100644 index 0000000..3b0d0a5 --- /dev/null +++ b/static/graphs/99784b80-6298-45ba-885c-0ed37bfd8324 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"microsoft-activity-group=TERBIUM" [label="microsoft-activity-group\nTERBIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=TERBIUM" -> "threat-actor=TERBIUM" [label="similar",dir="both"];"threat-actor=TERBIUM" [label="threat-actor\nTERBIUM",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/99784b80-6298-45ba-885c-0ed37bfd8324.png b/static/graphs/99784b80-6298-45ba-885c-0ed37bfd8324.png new file mode 100644 index 0000000..8439eb7 Binary files /dev/null and b/static/graphs/99784b80-6298-45ba-885c-0ed37bfd8324.png differ diff --git a/static/graphs/9991ace8-1a62-498c-a9ef-19d474deb505 b/static/graphs/9991ace8-1a62-498c-a9ef-19d474deb505 new file mode 100644 index 0000000..581b837 --- /dev/null +++ b/static/graphs/9991ace8-1a62-498c-a9ef-19d474deb505 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=StreamEx" [label="tool\nStreamEx",shape=box,style=filled,color=deepskyblue];"tool=StreamEx" -> "mitre-enterprise-attack-malware=StreamEx - S0142" [label="similar",dir="both"];"mitre-enterprise-attack-malware=StreamEx - S0142" [label="mitre-enterprise-attack-malware\nStreamEx - S0142",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=StreamEx - S0142" -> "mitre-enterprise-attack-attack-pattern=New Service - T1050" [label="uses",];} diff --git a/static/graphs/9991ace8-1a62-498c-a9ef-19d474deb505.png b/static/graphs/9991ace8-1a62-498c-a9ef-19d474deb505.png new file mode 100644 index 0000000..08e04bb Binary files /dev/null and b/static/graphs/9991ace8-1a62-498c-a9ef-19d474deb505.png differ diff --git a/static/graphs/99c5cbdd-9c04-4c18-bcdd-9ee9b4dba862 b/static/graphs/99c5cbdd-9c04-4c18-bcdd-9ee9b4dba862 new file mode 100644 index 0000000..52fbec1 --- /dev/null +++ b/static/graphs/99c5cbdd-9c04-4c18-bcdd-9ee9b4dba862 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=Cryptomix-WORK" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];} diff --git a/static/graphs/99c5cbdd-9c04-4c18-bcdd-9ee9b4dba862.png b/static/graphs/99c5cbdd-9c04-4c18-bcdd-9ee9b4dba862.png new file mode 100644 index 0000000..bc3a8fe Binary files /dev/null and b/static/graphs/99c5cbdd-9c04-4c18-bcdd-9ee9b4dba862.png differ diff --git a/static/graphs/99d9110d-85a4-4819-9f85-05e4b73aa5f3 b/static/graphs/99d9110d-85a4-4819-9f85-05e4b73aa5f3 new file mode 100644 index 0000000..1763159 --- /dev/null +++ b/static/graphs/99d9110d-85a4-4819-9f85-05e4b73aa5f3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Upatre" [label="tool\nUpatre",shape=box,style=filled,color=deepskyblue];"tool=Upatre" -> "malpedia=Upatre" [label="similar",dir="both"];} diff --git a/static/graphs/99d9110d-85a4-4819-9f85-05e4b73aa5f3.png b/static/graphs/99d9110d-85a4-4819-9f85-05e4b73aa5f3.png new file mode 100644 index 0000000..c09288a Binary files /dev/null and b/static/graphs/99d9110d-85a4-4819-9f85-05e4b73aa5f3.png differ diff --git a/static/graphs/99e30d89-9361-4b73-a999-9e5ff9320bcb b/static/graphs/99e30d89-9361-4b73-a999-9e5ff9320bcb new file mode 100644 index 0000000..f2aae8d --- /dev/null +++ b/static/graphs/99e30d89-9361-4b73-a999-9e5ff9320bcb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Aurora Panda" [label="threat-actor\nAurora Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Aurora Panda" -> "mitre-pre-attack-intrusion-set=APT17 - G0025" [label="similar",dir="both"];"threat-actor=Aurora Panda" -> "threat-actor=Axiom" [label="similar",dir="both"];"threat-actor=Aurora Panda" -> "mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" [label="similar",dir="both"];"threat-actor=Aurora Panda" -> "mitre-enterprise-attack-intrusion-set=Axiom - G0001" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" [label="mitre-enterprise-attack-intrusion-set\nWinnti Group - G0044",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];"mitre-enterprise-attack-intrusion-set=APT17 - G0025" [label="mitre-enterprise-attack-intrusion-set\nAPT17 - G0025",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" [label="mitre-enterprise-attack-intrusion-set\nAxiom - G0001",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" -> "mitre-enterprise-attack-attack-pattern=Exploit Public-Facing Application - T1190" [label="uses",];"mitre-pre-attack-intrusion-set=APT17 - G0025" [label="mitre-pre-attack-intrusion-set\nAPT17 - G0025",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT17 - G0025" -> "mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" [label="uses",];"threat-actor=Axiom" [label="threat-actor\nAxiom",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" [label="mitre-enterprise-attack-malware\nBLACKCOFFEE - S0069",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/99e30d89-9361-4b73-a999-9e5ff9320bcb.png b/static/graphs/99e30d89-9361-4b73-a999-9e5ff9320bcb.png new file mode 100644 index 0000000..41e9ab2 Binary files /dev/null and b/static/graphs/99e30d89-9361-4b73-a999-9e5ff9320bcb.png differ diff --git a/static/graphs/9a2640c2-9f43-46fe-b13f-bde881e55555 b/static/graphs/9a2640c2-9f43-46fe-b13f-bde881e55555 new file mode 100644 index 0000000..9400437 --- /dev/null +++ b/static/graphs/9a2640c2-9f43-46fe-b13f-bde881e55555 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=sqlmap - S0225" [label="mitre-enterprise-attack-tool\nsqlmap - S0225",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=sqlmap - S0225" -> "mitre-enterprise-attack-attack-pattern=Exploit Public-Facing Application - T1190" [label="uses",];} diff --git a/static/graphs/9a2640c2-9f43-46fe-b13f-bde881e55555.png b/static/graphs/9a2640c2-9f43-46fe-b13f-bde881e55555.png new file mode 100644 index 0000000..2c08817 Binary files /dev/null and b/static/graphs/9a2640c2-9f43-46fe-b13f-bde881e55555.png differ diff --git a/static/graphs/9a5b7194-88e0-4579-b82f-e3c27b8cca80 b/static/graphs/9a5b7194-88e0-4579-b82f-e3c27b8cca80 new file mode 100644 index 0000000..adee872 --- /dev/null +++ b/static/graphs/9a5b7194-88e0-4579-b82f-e3c27b8cca80 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Create Account Mitigation - T1136" [label="mitre-enterprise-attack-course-of-action\nCreate Account Mitigation - T1136",shape=ellipse];"mitre-enterprise-attack-course-of-action=Create Account Mitigation - T1136" -> "mitre-enterprise-attack-attack-pattern=Create Account - T1136" [label="mitigates",];} diff --git a/static/graphs/9a5b7194-88e0-4579-b82f-e3c27b8cca80.png b/static/graphs/9a5b7194-88e0-4579-b82f-e3c27b8cca80.png new file mode 100644 index 0000000..868cfce Binary files /dev/null and b/static/graphs/9a5b7194-88e0-4579-b82f-e3c27b8cca80.png differ diff --git a/static/graphs/9a683d9c-8f7d-43df-bba2-ad0ca71e277c b/static/graphs/9a683d9c-8f7d-43df-bba2-ad0ca71e277c new file mode 100644 index 0000000..3d09f2b --- /dev/null +++ b/static/graphs/9a683d9c-8f7d-43df-bba2-ad0ca71e277c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Wekby" [label="threat-actor\nWekby",shape=octagon,style=filled,color=indianred1];"threat-actor=Wekby" -> "mitre-enterprise-attack-intrusion-set=APT18 - G0026" [label="similar",dir="both"];"threat-actor=Wekby" -> "threat-actor=Samurai Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT18 - G0026" [label="mitre-enterprise-attack-intrusion-set\nAPT18 - G0026",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT18 - G0026" -> "threat-actor=Maverick Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT18 - G0026" -> "mitre-enterprise-attack-attack-pattern=File Deletion - T1107" [label="uses",];"threat-actor=Samurai Panda" [label="threat-actor\nSamurai Panda",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/9a683d9c-8f7d-43df-bba2-ad0ca71e277c.png b/static/graphs/9a683d9c-8f7d-43df-bba2-ad0ca71e277c.png new file mode 100644 index 0000000..1ca58e6 Binary files /dev/null and b/static/graphs/9a683d9c-8f7d-43df-bba2-ad0ca71e277c.png differ diff --git a/static/graphs/9a902722-cecd-4fbe-a6c9-49333aa0f8c2 b/static/graphs/9a902722-cecd-4fbe-a6c9-49333aa0f8c2 new file mode 100644 index 0000000..683451a --- /dev/null +++ b/static/graphs/9a902722-cecd-4fbe-a6c9-49333aa0f8c2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Remote System Discovery Mitigation - T1018" [label="mitre-enterprise-attack-course-of-action\nRemote System Discovery Mitigation - T1018",shape=ellipse];"mitre-enterprise-attack-course-of-action=Remote System Discovery Mitigation - T1018" -> "mitre-enterprise-attack-attack-pattern=Remote System Discovery - T1018" [label="mitigates",];} diff --git a/static/graphs/9a902722-cecd-4fbe-a6c9-49333aa0f8c2.png b/static/graphs/9a902722-cecd-4fbe-a6c9-49333aa0f8c2.png new file mode 100644 index 0000000..5460a6c Binary files /dev/null and b/static/graphs/9a902722-cecd-4fbe-a6c9-49333aa0f8c2.png differ diff --git a/static/graphs/9ab7de33-99b2-4d8d-8cf3-182fa0015cc2 b/static/graphs/9ab7de33-99b2-4d8d-8cf3-182fa0015cc2 new file mode 100644 index 0000000..983d492 --- /dev/null +++ b/static/graphs/9ab7de33-99b2-4d8d-8cf3-182fa0015cc2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Logon Scripts Mitigation - T1037" [label="mitre-enterprise-attack-course-of-action\nLogon Scripts Mitigation - T1037",shape=ellipse];"mitre-enterprise-attack-course-of-action=Logon Scripts Mitigation - T1037" -> "mitre-enterprise-attack-attack-pattern=Logon Scripts - T1037" [label="mitigates",];} diff --git a/static/graphs/9ab7de33-99b2-4d8d-8cf3-182fa0015cc2.png b/static/graphs/9ab7de33-99b2-4d8d-8cf3-182fa0015cc2.png new file mode 100644 index 0000000..3c23519 Binary files /dev/null and b/static/graphs/9ab7de33-99b2-4d8d-8cf3-182fa0015cc2.png differ diff --git a/static/graphs/9ad11139-e928-45cf-a0b4-937290642e92 b/static/graphs/9ad11139-e928-45cf-a0b4-937290642e92 new file mode 100644 index 0000000..092f34e --- /dev/null +++ b/static/graphs/9ad11139-e928-45cf-a0b4-937290642e92 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Dark Comet" [label="tool\nDark Comet",shape=box,style=filled,color=deepskyblue];"tool=Dark Comet" -> "rat=DarkComet" [label="similar",dir="both"];"tool=Dark Comet" -> "malpedia=DarkComet" [label="similar",dir="both"];"rat=DarkComet" [label="rat\nDarkComet",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/9ad11139-e928-45cf-a0b4-937290642e92.png b/static/graphs/9ad11139-e928-45cf-a0b4-937290642e92.png new file mode 100644 index 0000000..c187244 Binary files /dev/null and b/static/graphs/9ad11139-e928-45cf-a0b4-937290642e92.png differ diff --git a/static/graphs/9b3a4cff-1c5a-4fd6-b49c-27240b6d622c b/static/graphs/9b3a4cff-1c5a-4fd6-b49c-27240b6d622c new file mode 100644 index 0000000..912c1c6 --- /dev/null +++ b/static/graphs/9b3a4cff-1c5a-4fd6-b49c-27240b6d622c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Winnti" [label="tool\nWinnti",shape=box,style=filled,color=deepskyblue];"tool=Winnti" -> "mitre-enterprise-attack-malware=Winnti - S0141" [label="similar",dir="both"];"tool=Winnti" -> "malpedia=Winnti (Windows)" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Winnti - S0141" [label="mitre-enterprise-attack-malware\nWinnti - S0141",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Winnti - S0141" -> "mitre-enterprise-attack-attack-pattern=Masquerading - T1036" [label="uses",];} diff --git a/static/graphs/9b3a4cff-1c5a-4fd6-b49c-27240b6d622c.png b/static/graphs/9b3a4cff-1c5a-4fd6-b49c-27240b6d622c.png new file mode 100644 index 0000000..3ca5898 Binary files /dev/null and b/static/graphs/9b3a4cff-1c5a-4fd6-b49c-27240b6d622c.png differ diff --git a/static/graphs/9bca63cc-f0c7-4704-9c5f-b5bf473a9b43 b/static/graphs/9bca63cc-f0c7-4704-9c5f-b5bf473a9b43 new file mode 100644 index 0000000..c999cd6 --- /dev/null +++ b/static/graphs/9bca63cc-f0c7-4704-9c5f-b5bf473a9b43 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Rustock" [label="botnet\nRustock",shape=box,style=filled,color=deepskyblue];"botnet=Rustock" -> "malpedia=Rustock" [label="similar",dir="both"];} diff --git a/static/graphs/9bca63cc-f0c7-4704-9c5f-b5bf473a9b43.png b/static/graphs/9bca63cc-f0c7-4704-9c5f-b5bf473a9b43.png new file mode 100644 index 0000000..dc620b4 Binary files /dev/null and b/static/graphs/9bca63cc-f0c7-4704-9c5f-b5bf473a9b43.png differ diff --git a/static/graphs/9c124874-042d-48cd-b72b-ccdc51ecbbd6 b/static/graphs/9c124874-042d-48cd-b72b-ccdc51ecbbd6 new file mode 100644 index 0000000..c9534f4 --- /dev/null +++ b/static/graphs/9c124874-042d-48cd-b72b-ccdc51ecbbd6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=APT41" [label="threat-actor\nAPT41",shape=octagon,style=filled,color=indianred1];"threat-actor=APT41" -> "backdoor=Speculoos" [label="uses",];"backdoor=Speculoos" [label="backdoor\nSpeculoos",shape=box,style=filled,color=deepskyblue];"backdoor=Speculoos" -> "threat-actor=APT41" [label="used-by",];} diff --git a/static/graphs/9c124874-042d-48cd-b72b-ccdc51ecbbd6.png b/static/graphs/9c124874-042d-48cd-b72b-ccdc51ecbbd6.png new file mode 100644 index 0000000..124fde9 Binary files /dev/null and b/static/graphs/9c124874-042d-48cd-b72b-ccdc51ecbbd6.png differ diff --git a/static/graphs/9ca488bd-9587-48ef-b923-1743523e63b2 b/static/graphs/9ca488bd-9587-48ef-b923-1743523e63b2 new file mode 100644 index 0000000..e90fd74 --- /dev/null +++ b/static/graphs/9ca488bd-9587-48ef-b923-1743523e63b2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=SOUNDBITE - S0157" [label="mitre-enterprise-attack-malware\nSOUNDBITE - S0157",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SOUNDBITE - S0157" -> "malpedia=SOUNDBITE" [label="similar",dir="both"];"mitre-enterprise-attack-malware=SOUNDBITE - S0157" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];} diff --git a/static/graphs/9ca488bd-9587-48ef-b923-1743523e63b2.png b/static/graphs/9ca488bd-9587-48ef-b923-1743523e63b2.png new file mode 100644 index 0000000..19ec559 Binary files /dev/null and b/static/graphs/9ca488bd-9587-48ef-b923-1743523e63b2.png differ diff --git a/static/graphs/9d67069c-b778-486f-8158-53f5dcd05d08 b/static/graphs/9d67069c-b778-486f-8158-53f5dcd05d08 new file mode 100644 index 0000000..0c50187 --- /dev/null +++ b/static/graphs/9d67069c-b778-486f-8158-53f5dcd05d08 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=IcedID" [label="banker\nIcedID",shape=box,style=filled,color=deepskyblue];"banker=IcedID" -> "malpedia=IcedID" [label="similar",dir="both"];} diff --git a/static/graphs/9d67069c-b778-486f-8158-53f5dcd05d08.png b/static/graphs/9d67069c-b778-486f-8158-53f5dcd05d08.png new file mode 100644 index 0000000..cc07a41 Binary files /dev/null and b/static/graphs/9d67069c-b778-486f-8158-53f5dcd05d08.png differ diff --git a/static/graphs/9d7c772b-43f1-49cf-bc70-7a7cd2ed34c8 b/static/graphs/9d7c772b-43f1-49cf-bc70-7a7cd2ed34c8 new file mode 100644 index 0000000..d5e105b --- /dev/null +++ b/static/graphs/9d7c772b-43f1-49cf-bc70-7a7cd2ed34c8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Chrysaor" [label="tool\nChrysaor",shape=box,style=filled,color=deepskyblue];"tool=Chrysaor" -> "mitre-mobile-attack-malware=Pegasus - MOB-S0005" [label="similar",dir="both"];"tool=Chrysaor" -> "mitre-mobile-attack-malware=Pegasus for Android - MOB-S0032" [label="similar",dir="both"];"tool=Chrysaor" -> "malpedia=Chrysaor" [label="similar",dir="both"];"mitre-mobile-attack-malware=Pegasus - MOB-S0005" [label="mitre-mobile-attack-malware\nPegasus - MOB-S0005",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Pegasus - MOB-S0005" -> "mitre-mobile-attack-attack-pattern=Capture SMS Messages - MOB-T1015" [label="uses",];"mitre-mobile-attack-malware=Pegasus - MOB-S0005" -> "mitre-mobile-attack-attack-pattern=Exploit OS Vulnerability - MOB-T1007" [label="uses",];"mitre-mobile-attack-malware=Pegasus for Android - MOB-S0032" [label="mitre-mobile-attack-malware\nPegasus for Android - MOB-S0032",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Pegasus for Android - MOB-S0032" -> "mitre-mobile-attack-attack-pattern=Application Discovery - MOB-T1021" [label="uses",];} diff --git a/static/graphs/9d7c772b-43f1-49cf-bc70-7a7cd2ed34c8.png b/static/graphs/9d7c772b-43f1-49cf-bc70-7a7cd2ed34c8.png new file mode 100644 index 0000000..637f719 Binary files /dev/null and b/static/graphs/9d7c772b-43f1-49cf-bc70-7a7cd2ed34c8.png differ diff --git a/static/graphs/9da16278-c6c5-4410-8a6b-9c16ce8005b3 b/static/graphs/9da16278-c6c5-4410-8a6b-9c16ce8005b3 new file mode 100644 index 0000000..6175b6a --- /dev/null +++ b/static/graphs/9da16278-c6c5-4410-8a6b-9c16ce8005b3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Screensaver Mitigation - T1180" [label="mitre-enterprise-attack-course-of-action\nScreensaver Mitigation - T1180",shape=ellipse];"mitre-enterprise-attack-course-of-action=Screensaver Mitigation - T1180" -> "mitre-enterprise-attack-attack-pattern=Screensaver - T1180" [label="mitigates",];} diff --git a/static/graphs/9da16278-c6c5-4410-8a6b-9c16ce8005b3.png b/static/graphs/9da16278-c6c5-4410-8a6b-9c16ce8005b3.png new file mode 100644 index 0000000..4734fcd Binary files /dev/null and b/static/graphs/9da16278-c6c5-4410-8a6b-9c16ce8005b3.png differ diff --git a/static/graphs/9de2308e-7bed-43a3-8e58-f194b3586700 b/static/graphs/9de2308e-7bed-43a3-8e58-f194b3586700 new file mode 100644 index 0000000..2b130d6 --- /dev/null +++ b/static/graphs/9de2308e-7bed-43a3-8e58-f194b3586700 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=pwdump - S0006" [label="mitre-enterprise-attack-tool\npwdump - S0006",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=pwdump - S0006" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];} diff --git a/static/graphs/9de2308e-7bed-43a3-8e58-f194b3586700.png b/static/graphs/9de2308e-7bed-43a3-8e58-f194b3586700.png new file mode 100644 index 0000000..1a78844 Binary files /dev/null and b/static/graphs/9de2308e-7bed-43a3-8e58-f194b3586700.png differ diff --git a/static/graphs/9e2bba94-950b-4fcf-8070-cb3f816c5f4e b/static/graphs/9e2bba94-950b-4fcf-8070-cb3f816c5f4e new file mode 100644 index 0000000..b646a0b --- /dev/null +++ b/static/graphs/9e2bba94-950b-4fcf-8070-cb3f816c5f4e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=hcdLoader - S0071" [label="mitre-enterprise-attack-malware\nhcdLoader - S0071",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=hcdLoader - S0071" -> "rat=hcdLoader" [label="similar",dir="both"];"mitre-enterprise-attack-malware=hcdLoader - S0071" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];"rat=hcdLoader" [label="rat\nhcdLoader",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/9e2bba94-950b-4fcf-8070-cb3f816c5f4e.png b/static/graphs/9e2bba94-950b-4fcf-8070-cb3f816c5f4e.png new file mode 100644 index 0000000..7bfa5a2 Binary files /dev/null and b/static/graphs/9e2bba94-950b-4fcf-8070-cb3f816c5f4e.png differ diff --git a/static/graphs/9e57c770-5a39-49a2-bb91-253ba629e3ac b/static/graphs/9e57c770-5a39-49a2-bb91-253ba629e3ac new file mode 100644 index 0000000..3fb732f --- /dev/null +++ b/static/graphs/9e57c770-5a39-49a2-bb91-253ba629e3ac @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Security Support Provider Mitigation - T1101" [label="mitre-enterprise-attack-course-of-action\nSecurity Support Provider Mitigation - T1101",shape=ellipse];"mitre-enterprise-attack-course-of-action=Security Support Provider Mitigation - T1101" -> "mitre-enterprise-attack-attack-pattern=Security Support Provider - T1101" [label="mitigates",];} diff --git a/static/graphs/9e57c770-5a39-49a2-bb91-253ba629e3ac.png b/static/graphs/9e57c770-5a39-49a2-bb91-253ba629e3ac.png new file mode 100644 index 0000000..25a9304 Binary files /dev/null and b/static/graphs/9e57c770-5a39-49a2-bb91-253ba629e3ac.png differ diff --git a/static/graphs/9e71024e-817f-45b0-92a0-d886c30bc929 b/static/graphs/9e71024e-817f-45b0-92a0-d886c30bc929 new file mode 100644 index 0000000..c3ca924 --- /dev/null +++ b/static/graphs/9e71024e-817f-45b0-92a0-d886c30bc929 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Dust Storm" [label="threat-actor\nDust Storm",shape=octagon,style=filled,color=indianred1];"threat-actor=Dust Storm" -> "mitre-enterprise-attack-intrusion-set=Dust Storm - G0031" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Dust Storm - G0031" [label="mitre-enterprise-attack-intrusion-set\nDust Storm - G0031",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Dust Storm - G0031" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];} diff --git a/static/graphs/9e71024e-817f-45b0-92a0-d886c30bc929.png b/static/graphs/9e71024e-817f-45b0-92a0-d886c30bc929.png new file mode 100644 index 0000000..bd443b7 Binary files /dev/null and b/static/graphs/9e71024e-817f-45b0-92a0-d886c30bc929.png differ diff --git a/static/graphs/9e729a7e-0dd6-4097-95bf-db8d64911383 b/static/graphs/9e729a7e-0dd6-4097-95bf-db8d64911383 new file mode 100644 index 0000000..4d99dd3 --- /dev/null +++ b/static/graphs/9e729a7e-0dd6-4097-95bf-db8d64911383 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Darkhotel - G0012" [label="mitre-enterprise-attack-intrusion-set\nDarkhotel - G0012",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Darkhotel - G0012" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];} diff --git a/static/graphs/9e729a7e-0dd6-4097-95bf-db8d64911383.png b/static/graphs/9e729a7e-0dd6-4097-95bf-db8d64911383.png new file mode 100644 index 0000000..3028dab Binary files /dev/null and b/static/graphs/9e729a7e-0dd6-4097-95bf-db8d64911383.png differ diff --git a/static/graphs/9e9b9415-a7df-406b-b14d-92bfe6809fbe b/static/graphs/9e9b9415-a7df-406b-b14d-92bfe6809fbe new file mode 100644 index 0000000..c4c2a25 --- /dev/null +++ b/static/graphs/9e9b9415-a7df-406b-b14d-92bfe6809fbe @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Nidiran - S0118" [label="mitre-enterprise-attack-malware\nNidiran - S0118",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Nidiran - S0118" -> "mitre-enterprise-attack-attack-pattern=Standard Cryptographic Protocol - T1032" [label="uses",];} diff --git a/static/graphs/9e9b9415-a7df-406b-b14d-92bfe6809fbe.png b/static/graphs/9e9b9415-a7df-406b-b14d-92bfe6809fbe.png new file mode 100644 index 0000000..432048b Binary files /dev/null and b/static/graphs/9e9b9415-a7df-406b-b14d-92bfe6809fbe.png differ diff --git a/static/graphs/9ea525fa-b0a9-4dde-84f2-bcea0137b3c1 b/static/graphs/9ea525fa-b0a9-4dde-84f2-bcea0137b3c1 new file mode 100644 index 0000000..cb9267c --- /dev/null +++ b/static/graphs/9ea525fa-b0a9-4dde-84f2-bcea0137b3c1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=MoonWind - S0149" [label="mitre-enterprise-attack-malware\nMoonWind - S0149",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=MoonWind - S0149" -> "rat=MoonWind" [label="similar",dir="both"];"mitre-enterprise-attack-malware=MoonWind - S0149" -> "tool=MoonWind" [label="similar",dir="both"];"mitre-enterprise-attack-malware=MoonWind - S0149" -> "malpedia=MoonWind" [label="similar",dir="both"];"mitre-enterprise-attack-malware=MoonWind - S0149" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];"rat=MoonWind" [label="rat\nMoonWind",shape=box,style=filled,color=deepskyblue];"tool=MoonWind" [label="tool\nMoonWind",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/9ea525fa-b0a9-4dde-84f2-bcea0137b3c1.png b/static/graphs/9ea525fa-b0a9-4dde-84f2-bcea0137b3c1.png new file mode 100644 index 0000000..7266f4f Binary files /dev/null and b/static/graphs/9ea525fa-b0a9-4dde-84f2-bcea0137b3c1.png differ diff --git a/static/graphs/9eb89081-3245-423a-995f-c1d78ce39619 b/static/graphs/9eb89081-3245-423a-995f-c1d78ce39619 new file mode 100644 index 0000000..0c7184c --- /dev/null +++ b/static/graphs/9eb89081-3245-423a-995f-c1d78ce39619 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Citadel" [label="banker\nCitadel",shape=box,style=filled,color=deepskyblue];"banker=Citadel" -> "malpedia=Citadel" [label="similar",dir="both"];} diff --git a/static/graphs/9eb89081-3245-423a-995f-c1d78ce39619.png b/static/graphs/9eb89081-3245-423a-995f-c1d78ce39619.png new file mode 100644 index 0000000..e1f2a5e Binary files /dev/null and b/static/graphs/9eb89081-3245-423a-995f-c1d78ce39619.png differ diff --git a/static/graphs/9f9daf7b-3530-4e2d-9d2c-d1036bafc825 b/static/graphs/9f9daf7b-3530-4e2d-9d2c-d1036bafc825 new file mode 100644 index 0000000..9f23e7a --- /dev/null +++ b/static/graphs/9f9daf7b-3530-4e2d-9d2c-d1036bafc825 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=IsErIk" [label="tool\nIsErIk",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/9f9daf7b-3530-4e2d-9d2c-d1036bafc825.png b/static/graphs/9f9daf7b-3530-4e2d-9d2c-d1036bafc825.png new file mode 100644 index 0000000..3b765a3 Binary files /dev/null and b/static/graphs/9f9daf7b-3530-4e2d-9d2c-d1036bafc825.png differ diff --git a/static/graphs/9fa93bb7-2997-4864-aa0e-0e667990dec8 b/static/graphs/9fa93bb7-2997-4864-aa0e-0e667990dec8 new file mode 100644 index 0000000..2319fe2 --- /dev/null +++ b/static/graphs/9fa93bb7-2997-4864-aa0e-0e667990dec8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=PowerWare" [label="ransomware\nPowerWare",shape=box,style=filled,color=deepskyblue];"ransomware=PowerWare" -> "malpedia=PowerWare" [label="similar",dir="both"];} diff --git a/static/graphs/9fa93bb7-2997-4864-aa0e-0e667990dec8.png b/static/graphs/9fa93bb7-2997-4864-aa0e-0e667990dec8.png new file mode 100644 index 0000000..277abc9 Binary files /dev/null and b/static/graphs/9fa93bb7-2997-4864-aa0e-0e667990dec8.png differ diff --git a/static/graphs/9fed4326-a7ad-4c58-ab87-90ac3957d82f b/static/graphs/9fed4326-a7ad-4c58-ab87-90ac3957d82f new file mode 100644 index 0000000..e542922 --- /dev/null +++ b/static/graphs/9fed4326-a7ad-4c58-ab87-90ac3957d82f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Dimnie" [label="tool\nDimnie",shape=box,style=filled,color=deepskyblue];"tool=Dimnie" -> "malpedia=Dimnie" [label="similar",dir="both"];} diff --git a/static/graphs/9fed4326-a7ad-4c58-ab87-90ac3957d82f.png b/static/graphs/9fed4326-a7ad-4c58-ab87-90ac3957d82f.png new file mode 100644 index 0000000..4d57d94 Binary files /dev/null and b/static/graphs/9fed4326-a7ad-4c58-ab87-90ac3957d82f.png differ diff --git a/static/graphs/a0082cfa-32e2-42b8-92d8-5c7a7409dcf1 b/static/graphs/a0082cfa-32e2-42b8-92d8-5c7a7409dcf1 new file mode 100644 index 0000000..7eee9ce --- /dev/null +++ b/static/graphs/a0082cfa-32e2-42b8-92d8-5c7a7409dcf1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Cutting Kitten" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Cleaver" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=OilRig" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Clever Kitten" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Flying Kitten" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Charming Kitten" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Rocket Kitten" [label="similar",dir="both"];"threat-actor=CHRYSENE" -> "threat-actor=Greenbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="similar",dir="both"];"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/a0082cfa-32e2-42b8-92d8-5c7a7409dcf1.png b/static/graphs/a0082cfa-32e2-42b8-92d8-5c7a7409dcf1.png new file mode 100644 index 0000000..0c9b9f1 Binary files /dev/null and b/static/graphs/a0082cfa-32e2-42b8-92d8-5c7a7409dcf1.png differ diff --git a/static/graphs/a01e1d0b-5303-4d11-94dc-7db74f3d599d b/static/graphs/a01e1d0b-5303-4d11-94dc-7db74f3d599d new file mode 100644 index 0000000..aed686e --- /dev/null +++ b/static/graphs/a01e1d0b-5303-4d11-94dc-7db74f3d599d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=Andr/Dropr-FH" [label="android\nAndr/Dropr-FH",shape=box,style=filled,color=deepskyblue];"android=Andr/Dropr-FH" -> "malpedia=GhostCtrl" [label="similar",dir="both"];} diff --git a/static/graphs/a01e1d0b-5303-4d11-94dc-7db74f3d599d.png b/static/graphs/a01e1d0b-5303-4d11-94dc-7db74f3d599d.png new file mode 100644 index 0000000..2641ef0 Binary files /dev/null and b/static/graphs/a01e1d0b-5303-4d11-94dc-7db74f3d599d.png differ diff --git a/static/graphs/a088c428-d0bb-49c8-9ed7-dcced0c74754 b/static/graphs/a088c428-d0bb-49c8-9ed7-dcced0c74754 new file mode 100644 index 0000000..90d112d --- /dev/null +++ b/static/graphs/a088c428-d0bb-49c8-9ed7-dcced0c74754 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Karius" [label="banker\nKarius",shape=box,style=filled,color=deepskyblue];"banker=Karius" -> "malpedia=Karius" [label="similar",dir="both"];} diff --git a/static/graphs/a088c428-d0bb-49c8-9ed7-dcced0c74754.png b/static/graphs/a088c428-d0bb-49c8-9ed7-dcced0c74754.png new file mode 100644 index 0000000..734ed8b Binary files /dev/null and b/static/graphs/a088c428-d0bb-49c8-9ed7-dcced0c74754.png differ diff --git a/static/graphs/a09375e5-63d2-4b65-8b0d-1cfe3e6304ca b/static/graphs/a09375e5-63d2-4b65-8b0d-1cfe3e6304ca new file mode 100644 index 0000000..4dafc21 --- /dev/null +++ b/static/graphs/a09375e5-63d2-4b65-8b0d-1cfe3e6304ca @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Obfuscated Files or Information Mitigation - T1027" [label="mitre-enterprise-attack-course-of-action\nObfuscated Files or Information Mitigation - T1027",shape=ellipse];"mitre-enterprise-attack-course-of-action=Obfuscated Files or Information Mitigation - T1027" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="mitigates",];} diff --git a/static/graphs/a09375e5-63d2-4b65-8b0d-1cfe3e6304ca.png b/static/graphs/a09375e5-63d2-4b65-8b0d-1cfe3e6304ca.png new file mode 100644 index 0000000..397811d Binary files /dev/null and b/static/graphs/a09375e5-63d2-4b65-8b0d-1cfe3e6304ca.png differ diff --git a/static/graphs/a0a46c1b-e774-410e-a84b-020b2558d851 b/static/graphs/a0a46c1b-e774-410e-a84b-020b2558d851 new file mode 100644 index 0000000..b7227ef --- /dev/null +++ b/static/graphs/a0a46c1b-e774-410e-a84b-020b2558d851 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Drovorub" [label="tool\nDrovorub",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/a0a46c1b-e774-410e-a84b-020b2558d851.png b/static/graphs/a0a46c1b-e774-410e-a84b-020b2558d851.png new file mode 100644 index 0000000..283820b Binary files /dev/null and b/static/graphs/a0a46c1b-e774-410e-a84b-020b2558d851.png differ diff --git a/static/graphs/a0cb9370-e39b-44d5-9f50-ef78e412b973 b/static/graphs/a0cb9370-e39b-44d5-9f50-ef78e412b973 new file mode 100644 index 0000000..2f2c734 --- /dev/null +++ b/static/graphs/a0cb9370-e39b-44d5-9f50-ef78e412b973 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Axiom - G0001" [label="mitre-enterprise-attack-intrusion-set\nAxiom - G0001",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" -> "mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" -> "threat-actor=Aurora Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" -> "threat-actor=Axiom" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" -> "mitre-pre-attack-intrusion-set=APT17 - G0025" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" -> "mitre-enterprise-attack-attack-pattern=Exploit Public-Facing Application - T1190" [label="uses",];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" [label="mitre-enterprise-attack-intrusion-set\nWinnti Group - G0044",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];"mitre-enterprise-attack-intrusion-set=APT17 - G0025" [label="mitre-enterprise-attack-intrusion-set\nAPT17 - G0025",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT17 - G0025" [label="mitre-pre-attack-intrusion-set\nAPT17 - G0025",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT17 - G0025" -> "mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" [label="uses",];"threat-actor=Aurora Panda" [label="threat-actor\nAurora Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Axiom" [label="threat-actor\nAxiom",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" [label="mitre-enterprise-attack-malware\nBLACKCOFFEE - S0069",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/a0cb9370-e39b-44d5-9f50-ef78e412b973.png b/static/graphs/a0cb9370-e39b-44d5-9f50-ef78e412b973.png new file mode 100644 index 0000000..d797d4e Binary files /dev/null and b/static/graphs/a0cb9370-e39b-44d5-9f50-ef78e412b973.png differ diff --git a/static/graphs/a0d8db1d-a731-4428-8209-c07175f4b1fe b/static/graphs/a0d8db1d-a731-4428-8209-c07175f4b1fe new file mode 100644 index 0000000..b7140ae --- /dev/null +++ b/static/graphs/a0d8db1d-a731-4428-8209-c07175f4b1fe @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Uncommonly Used Port Mitigation - T1065" [label="mitre-enterprise-attack-course-of-action\nUncommonly Used Port Mitigation - T1065",shape=ellipse];"mitre-enterprise-attack-course-of-action=Uncommonly Used Port Mitigation - T1065" -> "mitre-enterprise-attack-attack-pattern=Uncommonly Used Port - T1065" [label="mitigates",];} diff --git a/static/graphs/a0d8db1d-a731-4428-8209-c07175f4b1fe.png b/static/graphs/a0d8db1d-a731-4428-8209-c07175f4b1fe.png new file mode 100644 index 0000000..ff9b4c8 Binary files /dev/null and b/static/graphs/a0d8db1d-a731-4428-8209-c07175f4b1fe.png differ diff --git a/static/graphs/a127a59e-9e4c-4c2b-b833-cabd076c3016 b/static/graphs/a127a59e-9e4c-4c2b-b833-cabd076c3016 new file mode 100644 index 0000000..e850038 --- /dev/null +++ b/static/graphs/a127a59e-9e4c-4c2b-b833-cabd076c3016 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Satana" [label="ransomware\nSatana",shape=box,style=filled,color=deepskyblue];"ransomware=Satana" -> "malpedia=Satana" [label="similar",dir="both"];} diff --git a/static/graphs/a127a59e-9e4c-4c2b-b833-cabd076c3016.png b/static/graphs/a127a59e-9e4c-4c2b-b833-cabd076c3016.png new file mode 100644 index 0000000..fa2acb1 Binary files /dev/null and b/static/graphs/a127a59e-9e4c-4c2b-b833-cabd076c3016.png differ diff --git a/static/graphs/a13e35cc-8c90-4d77-a965-5461042c1612 b/static/graphs/a13e35cc-8c90-4d77-a965-5461042c1612 new file mode 100644 index 0000000..3ec8e2d --- /dev/null +++ b/static/graphs/a13e35cc-8c90-4d77-a965-5461042c1612 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Shortcut Modification Mitigation - T1023" [label="mitre-enterprise-attack-course-of-action\nShortcut Modification Mitigation - T1023",shape=ellipse];"mitre-enterprise-attack-course-of-action=Shortcut Modification Mitigation - T1023" -> "mitre-enterprise-attack-attack-pattern=Shortcut Modification - T1023" [label="mitigates",];} diff --git a/static/graphs/a13e35cc-8c90-4d77-a965-5461042c1612.png b/static/graphs/a13e35cc-8c90-4d77-a965-5461042c1612.png new file mode 100644 index 0000000..111cdc5 Binary files /dev/null and b/static/graphs/a13e35cc-8c90-4d77-a965-5461042c1612.png differ diff --git a/static/graphs/a1482e43-f3ff-4fbd-94de-ad1244738166 b/static/graphs/a1482e43-f3ff-4fbd-94de-ad1244738166 new file mode 100644 index 0000000..8e8554b --- /dev/null +++ b/static/graphs/a1482e43-f3ff-4fbd-94de-ad1244738166 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Time Providers Mitigation - T1209" [label="mitre-enterprise-attack-course-of-action\nTime Providers Mitigation - T1209",shape=ellipse];"mitre-enterprise-attack-course-of-action=Time Providers Mitigation - T1209" -> "mitre-enterprise-attack-attack-pattern=Time Providers - T1209" [label="mitigates",];} diff --git a/static/graphs/a1482e43-f3ff-4fbd-94de-ad1244738166.png b/static/graphs/a1482e43-f3ff-4fbd-94de-ad1244738166.png new file mode 100644 index 0000000..57c5fd9 Binary files /dev/null and b/static/graphs/a1482e43-f3ff-4fbd-94de-ad1244738166.png differ diff --git a/static/graphs/a15c9357-2be0-4836-beec-594f28b9b4a9 b/static/graphs/a15c9357-2be0-4836-beec-594f28b9b4a9 new file mode 100644 index 0000000..043b600 --- /dev/null +++ b/static/graphs/a15c9357-2be0-4836-beec-594f28b9b4a9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=YiSpecter - MOB-S0027" [label="mitre-mobile-attack-malware\nYiSpecter - MOB-S0027",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=YiSpecter - MOB-S0027" -> "mitre-mobile-attack-attack-pattern=Abuse of iOS Enterprise App Signing Key - MOB-T1048" [label="uses",];"mitre-mobile-attack-attack-pattern=Abuse of iOS Enterprise App Signing Key - MOB-T1048" [label="mitre-mobile-attack-attack-pattern\nAbuse of iOS Enterprise App Signing Key - MOB-T1048",shape=ellipse];} diff --git a/static/graphs/a15c9357-2be0-4836-beec-594f28b9b4a9.png b/static/graphs/a15c9357-2be0-4836-beec-594f28b9b4a9.png new file mode 100644 index 0000000..bfff1a1 Binary files /dev/null and b/static/graphs/a15c9357-2be0-4836-beec-594f28b9b4a9.png differ diff --git a/static/graphs/a1867c56-8c86-455a-96ad-b0d5f7e2bc17 b/static/graphs/a1867c56-8c86-455a-96ad-b0d5f7e2bc17 new file mode 100644 index 0000000..a3c8322 --- /dev/null +++ b/static/graphs/a1867c56-8c86-455a-96ad-b0d5f7e2bc17 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=Trojan-SMS.AndroidOS.Agent.ao - MOB-S0023" [label="mitre-mobile-attack-malware\nTrojan-SMS.AndroidOS.Agent.ao - MOB-S0023",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Trojan-SMS.AndroidOS.Agent.ao - MOB-S0023" -> "mitre-mobile-attack-attack-pattern=Standard Application Layer Protocol - MOB-T1040" [label="uses",];} diff --git a/static/graphs/a1867c56-8c86-455a-96ad-b0d5f7e2bc17.png b/static/graphs/a1867c56-8c86-455a-96ad-b0d5f7e2bc17.png new file mode 100644 index 0000000..db5de29 Binary files /dev/null and b/static/graphs/a1867c56-8c86-455a-96ad-b0d5f7e2bc17.png differ diff --git a/static/graphs/a19c49aa-36fe-4c05-b817-23e1c7a7d085 b/static/graphs/a19c49aa-36fe-4c05-b817-23e1c7a7d085 new file mode 100644 index 0000000..0030216 --- /dev/null +++ b/static/graphs/a19c49aa-36fe-4c05-b817-23e1c7a7d085 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Wiper - S0041" [label="mitre-enterprise-attack-malware\nWiper - S0041",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Wiper - S0041" -> "mitre-enterprise-attack-attack-pattern=Third-party Software - T1072" [label="uses",];} diff --git a/static/graphs/a19c49aa-36fe-4c05-b817-23e1c7a7d085.png b/static/graphs/a19c49aa-36fe-4c05-b817-23e1c7a7d085.png new file mode 100644 index 0000000..46256bc Binary files /dev/null and b/static/graphs/a19c49aa-36fe-4c05-b817-23e1c7a7d085.png differ diff --git a/static/graphs/a1dd2dbd-1550-44bf-abcc-1a4c52e97719 b/static/graphs/a1dd2dbd-1550-44bf-abcc-1a4c52e97719 new file mode 100644 index 0000000..d3a130b --- /dev/null +++ b/static/graphs/a1dd2dbd-1550-44bf-abcc-1a4c52e97719 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Responder - S0174" [label="mitre-enterprise-attack-tool\nResponder - S0174",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Responder - S0174" -> "mitre-enterprise-attack-attack-pattern=Network Sniffing - T1040" [label="uses",];} diff --git a/static/graphs/a1dd2dbd-1550-44bf-abcc-1a4c52e97719.png b/static/graphs/a1dd2dbd-1550-44bf-abcc-1a4c52e97719.png new file mode 100644 index 0000000..07352d8 Binary files /dev/null and b/static/graphs/a1dd2dbd-1550-44bf-abcc-1a4c52e97719.png differ diff --git a/static/graphs/a21a6a79-f9a1-4c87-aed9-ba2d79536881 b/static/graphs/a21a6a79-f9a1-4c87-aed9-ba2d79536881 new file mode 100644 index 0000000..e107c44 --- /dev/null +++ b/static/graphs/a21a6a79-f9a1-4c87-aed9-ba2d79536881 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Stolen Developer Credentials or Signing Keys - MOB-T1044" [label="mitre-mobile-attack-attack-pattern\nStolen Developer Credentials or Signing Keys - MOB-T1044",shape=ellipse];} diff --git a/static/graphs/a21a6a79-f9a1-4c87-aed9-ba2d79536881.png b/static/graphs/a21a6a79-f9a1-4c87-aed9-ba2d79536881.png new file mode 100644 index 0000000..d1989f3 Binary files /dev/null and b/static/graphs/a21a6a79-f9a1-4c87-aed9-ba2d79536881.png differ diff --git a/static/graphs/a27fff00-995a-4598-ba00-05921bf20e80 b/static/graphs/a27fff00-995a-4598-ba00-05921bf20e80 new file mode 100644 index 0000000..d2cb01c --- /dev/null +++ b/static/graphs/a27fff00-995a-4598-ba00-05921bf20e80 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Alpha Ransomware" [label="ransomware\nAlpha Ransomware",shape=box,style=filled,color=deepskyblue];"ransomware=Alpha Ransomware" -> "malpedia=AlphaLocker" [label="similar",dir="both"];} diff --git a/static/graphs/a27fff00-995a-4598-ba00-05921bf20e80.png b/static/graphs/a27fff00-995a-4598-ba00-05921bf20e80.png new file mode 100644 index 0000000..01ef7d4 Binary files /dev/null and b/static/graphs/a27fff00-995a-4598-ba00-05921bf20e80.png differ diff --git a/static/graphs/a29af069-03c3-4534-b78b-7d1a77ea085b b/static/graphs/a29af069-03c3-4534-b78b-7d1a77ea085b new file mode 100644 index 0000000..68d83a3 --- /dev/null +++ b/static/graphs/a29af069-03c3-4534-b78b-7d1a77ea085b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=MuddyWater" [label="threat-actor\nMuddyWater",shape=octagon,style=filled,color=indianred1];"threat-actor=MuddyWater" -> "mitre-enterprise-attack-intrusion-set=MuddyWater - G0069" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=MuddyWater - G0069" [label="mitre-enterprise-attack-intrusion-set\nMuddyWater - G0069",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=MuddyWater - G0069" -> "mitre-enterprise-attack-attack-pattern=Mshta - T1170" [label="uses",];} diff --git a/static/graphs/a29af069-03c3-4534-b78b-7d1a77ea085b.png b/static/graphs/a29af069-03c3-4534-b78b-7d1a77ea085b.png new file mode 100644 index 0000000..8d09f93 Binary files /dev/null and b/static/graphs/a29af069-03c3-4534-b78b-7d1a77ea085b.png differ diff --git a/static/graphs/a2d1cdd6-1c3d-47b3-803b-9a3fffe2f051 b/static/graphs/a2d1cdd6-1c3d-47b3-803b-9a3fffe2f051 new file mode 100644 index 0000000..8b76633 --- /dev/null +++ b/static/graphs/a2d1cdd6-1c3d-47b3-803b-9a3fffe2f051 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Sedkit" [label="tool\nSedkit",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/a2d1cdd6-1c3d-47b3-803b-9a3fffe2f051.png b/static/graphs/a2d1cdd6-1c3d-47b3-803b-9a3fffe2f051.png new file mode 100644 index 0000000..654acaf Binary files /dev/null and b/static/graphs/a2d1cdd6-1c3d-47b3-803b-9a3fffe2f051.png differ diff --git a/static/graphs/a33df440-f112-4a5e-a290-3c65dae6091d b/static/graphs/a33df440-f112-4a5e-a290-3c65dae6091d new file mode 100644 index 0000000..56ed620 --- /dev/null +++ b/static/graphs/a33df440-f112-4a5e-a290-3c65dae6091d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Svpeng" [label="tool\nSvpeng",shape=box,style=filled,color=deepskyblue];"tool=Svpeng" -> "android=Svpeng" [label="similar",dir="both"];"tool=Svpeng" -> "malpedia=Svpeng" [label="similar",dir="both"];"android=Svpeng" [label="android\nSvpeng",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/a33df440-f112-4a5e-a290-3c65dae6091d.png b/static/graphs/a33df440-f112-4a5e-a290-3c65dae6091d.png new file mode 100644 index 0000000..58adcbd Binary files /dev/null and b/static/graphs/a33df440-f112-4a5e-a290-3c65dae6091d.png differ diff --git a/static/graphs/a379f09b-5cec-4bdb-9735-125cef2de073 b/static/graphs/a379f09b-5cec-4bdb-9735-125cef2de073 new file mode 100644 index 0000000..6a83ba6 --- /dev/null +++ b/static/graphs/a379f09b-5cec-4bdb-9735-125cef2de073 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=GLOOXMAIL" [label="tool\nGLOOXMAIL",shape=box,style=filled,color=deepskyblue];"tool=GLOOXMAIL" -> "mitre-enterprise-attack-malware=GLOOXMAIL - S0026" [label="similar",dir="both"];"mitre-enterprise-attack-malware=GLOOXMAIL - S0026" [label="mitre-enterprise-attack-malware\nGLOOXMAIL - S0026",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=GLOOXMAIL - S0026" -> "mitre-enterprise-attack-attack-pattern=Web Service - T1102" [label="uses",];} diff --git a/static/graphs/a379f09b-5cec-4bdb-9735-125cef2de073.png b/static/graphs/a379f09b-5cec-4bdb-9735-125cef2de073.png new file mode 100644 index 0000000..274a150 Binary files /dev/null and b/static/graphs/a379f09b-5cec-4bdb-9735-125cef2de073.png differ diff --git a/static/graphs/a3dad2be-ce62-4440-953b-00fbce7aba93 b/static/graphs/a3dad2be-ce62-4440-953b-00fbce7aba93 new file mode 100644 index 0000000..c7b6dbb --- /dev/null +++ b/static/graphs/a3dad2be-ce62-4440-953b-00fbce7aba93 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=AndroRAT - MOB-S0008" [label="mitre-mobile-attack-malware\nAndroRAT - MOB-S0008",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=AndroRAT - MOB-S0008" -> "malpedia=AndroRAT" [label="similar",dir="both"];"mitre-mobile-attack-malware=AndroRAT - MOB-S0008" -> "mitre-mobile-attack-attack-pattern=Capture SMS Messages - MOB-T1015" [label="uses",];"mitre-mobile-attack-malware=AndroRAT - MOB-S0008" -> "mitre-mobile-attack-attack-pattern=Access Contact List - MOB-T1035" [label="uses",];} diff --git a/static/graphs/a3dad2be-ce62-4440-953b-00fbce7aba93.png b/static/graphs/a3dad2be-ce62-4440-953b-00fbce7aba93.png new file mode 100644 index 0000000..49fbd45 Binary files /dev/null and b/static/graphs/a3dad2be-ce62-4440-953b-00fbce7aba93.png differ diff --git a/static/graphs/a3e12b04-8598-4909-8855-2c97c1e7d549 b/static/graphs/a3e12b04-8598-4909-8855-2c97c1e7d549 new file mode 100644 index 0000000..e6516ee --- /dev/null +++ b/static/graphs/a3e12b04-8598-4909-8855-2c97c1e7d549 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Kerberoasting Mitigation - T1208" [label="mitre-enterprise-attack-course-of-action\nKerberoasting Mitigation - T1208",shape=ellipse];"mitre-enterprise-attack-course-of-action=Kerberoasting Mitigation - T1208" -> "mitre-enterprise-attack-attack-pattern=Kerberoasting - T1208" [label="mitigates",];} diff --git a/static/graphs/a3e12b04-8598-4909-8855-2c97c1e7d549.png b/static/graphs/a3e12b04-8598-4909-8855-2c97c1e7d549.png new file mode 100644 index 0000000..b4b59b2 Binary files /dev/null and b/static/graphs/a3e12b04-8598-4909-8855-2c97c1e7d549.png differ diff --git a/static/graphs/a4036a28-3d94-11e8-ad9f-97ada3c6d5fb b/static/graphs/a4036a28-3d94-11e8-ad9f-97ada3c6d5fb new file mode 100644 index 0000000..d1cc263 --- /dev/null +++ b/static/graphs/a4036a28-3d94-11e8-ad9f-97ada3c6d5fb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Rovnix" [label="tool\nRovnix",shape=box,style=filled,color=deepskyblue];"tool=Rovnix" -> "malpedia=Rovnix" [label="similar",dir="both"];} diff --git a/static/graphs/a4036a28-3d94-11e8-ad9f-97ada3c6d5fb.png b/static/graphs/a4036a28-3d94-11e8-ad9f-97ada3c6d5fb.png new file mode 100644 index 0000000..47d0bde Binary files /dev/null and b/static/graphs/a4036a28-3d94-11e8-ad9f-97ada3c6d5fb.png differ diff --git a/static/graphs/a4757e11-0837-42c0-958a-7490cff58687 b/static/graphs/a4757e11-0837-42c0-958a-7490cff58687 new file mode 100644 index 0000000..a7647d3 --- /dev/null +++ b/static/graphs/a4757e11-0837-42c0-958a-7490cff58687 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"backdoor=SLUB" [label="backdoor\nSLUB",shape=box,style=filled,color=deepskyblue];"backdoor=SLUB" -> "tool=SLUB Backdoor" [label="similar",dir="both"];"tool=SLUB Backdoor" [label="tool\nSLUB Backdoor",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/a4757e11-0837-42c0-958a-7490cff58687.png b/static/graphs/a4757e11-0837-42c0-958a-7490cff58687.png new file mode 100644 index 0000000..b9c8f16 Binary files /dev/null and b/static/graphs/a4757e11-0837-42c0-958a-7490cff58687.png differ diff --git a/static/graphs/a4bac628-162c-4487-9bb5-c34e42dec72a b/static/graphs/a4bac628-162c-4487-9bb5-c34e42dec72a new file mode 100644 index 0000000..f55ea3d --- /dev/null +++ b/static/graphs/a4bac628-162c-4487-9bb5-c34e42dec72a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Test" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/a4bac628-162c-4487-9bb5-c34e42dec72a.png b/static/graphs/a4bac628-162c-4487-9bb5-c34e42dec72a.png new file mode 100644 index 0000000..9cdd68f Binary files /dev/null and b/static/graphs/a4bac628-162c-4487-9bb5-c34e42dec72a.png differ diff --git a/static/graphs/a51f07ae-ab2c-45ee-aa9c-1db7873e7bb4 b/static/graphs/a51f07ae-ab2c-45ee-aa9c-1db7873e7bb4 new file mode 100644 index 0000000..9fb2c11 --- /dev/null +++ b/static/graphs/a51f07ae-ab2c-45ee-aa9c-1db7873e7bb4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Ratty" [label="rat\nRatty",shape=box,style=filled,color=deepskyblue];"rat=Ratty" -> "malpedia=Ratty" [label="similar",dir="both"];} diff --git a/static/graphs/a51f07ae-ab2c-45ee-aa9c-1db7873e7bb4.png b/static/graphs/a51f07ae-ab2c-45ee-aa9c-1db7873e7bb4.png new file mode 100644 index 0000000..40c671b Binary files /dev/null and b/static/graphs/a51f07ae-ab2c-45ee-aa9c-1db7873e7bb4.png differ diff --git a/static/graphs/a52edc76-328d-4596-85e7-d56ef5a9eb69 b/static/graphs/a52edc76-328d-4596-85e7-d56ef5a9eb69 new file mode 100644 index 0000000..d6c8c39 --- /dev/null +++ b/static/graphs/a52edc76-328d-4596-85e7-d56ef5a9eb69 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Pass-The-Hash Toolkit - S0122" [label="mitre-enterprise-attack-tool\nPass-The-Hash Toolkit - S0122",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Pass-The-Hash Toolkit - S0122" -> "mitre-enterprise-attack-attack-pattern=Pass the Hash - T1075" [label="uses",];} diff --git a/static/graphs/a52edc76-328d-4596-85e7-d56ef5a9eb69.png b/static/graphs/a52edc76-328d-4596-85e7-d56ef5a9eb69.png new file mode 100644 index 0000000..7ff3ffd Binary files /dev/null and b/static/graphs/a52edc76-328d-4596-85e7-d56ef5a9eb69.png differ diff --git a/static/graphs/a5399473-859b-4c64-999b-a3b4070cd513 b/static/graphs/a5399473-859b-4c64-999b-a3b4070cd513 new file mode 100644 index 0000000..3318f06 --- /dev/null +++ b/static/graphs/a5399473-859b-4c64-999b-a3b4070cd513 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Kazuar" [label="tool\nKazuar",shape=box,style=filled,color=deepskyblue];"tool=Kazuar" -> "malpedia=Kazuar" [label="similar",dir="both"];} diff --git a/static/graphs/a5399473-859b-4c64-999b-a3b4070cd513.png b/static/graphs/a5399473-859b-4c64-999b-a3b4070cd513.png new file mode 100644 index 0000000..f060943 Binary files /dev/null and b/static/graphs/a5399473-859b-4c64-999b-a3b4070cd513.png differ diff --git a/static/graphs/a5528622-3a8a-4633-86ce-8cdaf8423858 b/static/graphs/a5528622-3a8a-4633-86ce-8cdaf8423858 new file mode 100644 index 0000000..e1d6b81 --- /dev/null +++ b/static/graphs/a5528622-3a8a-4633-86ce-8cdaf8423858 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=FinFisher - S0182" [label="mitre-enterprise-attack-malware\nFinFisher - S0182",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=FinFisher - S0182" -> "malpedia=FinFisher RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=FinFisher - S0182" -> "mitre-enterprise-attack-attack-pattern=DLL Search Order Hijacking - T1038" [label="uses",];} diff --git a/static/graphs/a5528622-3a8a-4633-86ce-8cdaf8423858.png b/static/graphs/a5528622-3a8a-4633-86ce-8cdaf8423858.png new file mode 100644 index 0000000..732930f Binary files /dev/null and b/static/graphs/a5528622-3a8a-4633-86ce-8cdaf8423858.png differ diff --git a/static/graphs/a569295c-a093-4db4-9fb4-7105edef85ad b/static/graphs/a569295c-a093-4db4-9fb4-7105edef85ad new file mode 100644 index 0000000..5d5e007 --- /dev/null +++ b/static/graphs/a569295c-a093-4db4-9fb4-7105edef85ad @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Custom Cryptographic Protocol Mitigation - T1024" [label="mitre-enterprise-attack-course-of-action\nCustom Cryptographic Protocol Mitigation - T1024",shape=ellipse];"mitre-enterprise-attack-course-of-action=Custom Cryptographic Protocol Mitigation - T1024" -> "mitre-enterprise-attack-attack-pattern=Custom Cryptographic Protocol - T1024" [label="mitigates",];} diff --git a/static/graphs/a569295c-a093-4db4-9fb4-7105edef85ad.png b/static/graphs/a569295c-a093-4db4-9fb4-7105edef85ad.png new file mode 100644 index 0000000..4f69bc0 Binary files /dev/null and b/static/graphs/a569295c-a093-4db4-9fb4-7105edef85ad.png differ diff --git a/static/graphs/a57a8bc3-8c33-43e8-b237-25edcd5f532a b/static/graphs/a57a8bc3-8c33-43e8-b237-25edcd5f532a new file mode 100644 index 0000000..c869f1d --- /dev/null +++ b/static/graphs/a57a8bc3-8c33-43e8-b237-25edcd5f532a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Windows_Security Ransonware" [label="ransomware\nWindows_Security Ransonware",shape=box,style=filled,color=deepskyblue];"ransomware=Windows_Security Ransonware" -> "ransomware=Encoder.xxxx" [label="similar",dir="both"];"ransomware=Encoder.xxxx" [label="ransomware\nEncoder.xxxx",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/a57a8bc3-8c33-43e8-b237-25edcd5f532a.png b/static/graphs/a57a8bc3-8c33-43e8-b237-25edcd5f532a.png new file mode 100644 index 0000000..ef93761 Binary files /dev/null and b/static/graphs/a57a8bc3-8c33-43e8-b237-25edcd5f532a.png differ diff --git a/static/graphs/a5be6094-2d17-11e8-a5b1-ff153ed7d9c3 b/static/graphs/a5be6094-2d17-11e8-a5b1-ff153ed7d9c3 new file mode 100644 index 0000000..626a2b2 --- /dev/null +++ b/static/graphs/a5be6094-2d17-11e8-a5b1-ff153ed7d9c3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=IcicleGum" [label="android\nIcicleGum",shape=box,style=filled,color=deepskyblue];"android=IcicleGum" -> "android=Igexin" [label="similar",dir="both"];"android=Igexin" [label="android\nIgexin",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/a5be6094-2d17-11e8-a5b1-ff153ed7d9c3.png b/static/graphs/a5be6094-2d17-11e8-a5b1-ff153ed7d9c3.png new file mode 100644 index 0000000..d7ce837 Binary files /dev/null and b/static/graphs/a5be6094-2d17-11e8-a5b1-ff153ed7d9c3.png differ diff --git a/static/graphs/a5e851b4-e046-43b6-bc6e-c6c008e3c5aa b/static/graphs/a5e851b4-e046-43b6-bc6e-c6c008e3c5aa new file mode 100644 index 0000000..63cbf30 --- /dev/null +++ b/static/graphs/a5e851b4-e046-43b6-bc6e-c6c008e3c5aa @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=DOGCALL" [label="tool\nDOGCALL",shape=box,style=filled,color=deepskyblue];"tool=DOGCALL" -> "mitre-enterprise-attack-malware=DOGCALL - S0213" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DOGCALL - S0213" [label="mitre-enterprise-attack-malware\nDOGCALL - S0213",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DOGCALL - S0213" -> "mitre-enterprise-attack-attack-pattern=Screen Capture - T1113" [label="uses",];} diff --git a/static/graphs/a5e851b4-e046-43b6-bc6e-c6c008e3c5aa.png b/static/graphs/a5e851b4-e046-43b6-bc6e-c6c008e3c5aa.png new file mode 100644 index 0000000..2660fdb Binary files /dev/null and b/static/graphs/a5e851b4-e046-43b6-bc6e-c6c008e3c5aa.png differ diff --git a/static/graphs/a60657fa-e2e7-4f8f-8128-a882534ae8c5 b/static/graphs/a60657fa-e2e7-4f8f-8128-a882534ae8c5 new file mode 100644 index 0000000..da26968 --- /dev/null +++ b/static/graphs/a60657fa-e2e7-4f8f-8128-a882534ae8c5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=OwaAuth - S0072" [label="mitre-enterprise-attack-malware\nOwaAuth - S0072",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=OwaAuth - S0072" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];} diff --git a/static/graphs/a60657fa-e2e7-4f8f-8128-a882534ae8c5.png b/static/graphs/a60657fa-e2e7-4f8f-8128-a882534ae8c5.png new file mode 100644 index 0000000..2e1933c Binary files /dev/null and b/static/graphs/a60657fa-e2e7-4f8f-8128-a882534ae8c5.png differ diff --git a/static/graphs/a653431d-6a5e-4600-8ad3-609b5af57064 b/static/graphs/a653431d-6a5e-4600-8ad3-609b5af57064 new file mode 100644 index 0000000..156b49d --- /dev/null +++ b/static/graphs/a653431d-6a5e-4600-8ad3-609b5af57064 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" [label="mitre-enterprise-attack-intrusion-set\nDeep Panda - G0009",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" -> "threat-actor=Shell Crew" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" -> "threat-actor=Hurricane Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" -> "threat-actor=Codoso" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Deep Panda - G0009" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"threat-actor=Codoso" [label="threat-actor\nCodoso",shape=octagon,style=filled,color=indianred1];"threat-actor=Shell Crew" [label="threat-actor\nShell Crew",shape=octagon,style=filled,color=indianred1];"threat-actor=Hurricane Panda" [label="threat-actor\nHurricane Panda",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/a653431d-6a5e-4600-8ad3-609b5af57064.png b/static/graphs/a653431d-6a5e-4600-8ad3-609b5af57064.png new file mode 100644 index 0000000..25a4e24 Binary files /dev/null and b/static/graphs/a653431d-6a5e-4600-8ad3-609b5af57064.png differ diff --git a/static/graphs/a68f1b43-c742-4f90-974d-2e74ec703e44 b/static/graphs/a68f1b43-c742-4f90-974d-2e74ec703e44 new file mode 100644 index 0000000..c8ed486 --- /dev/null +++ b/static/graphs/a68f1b43-c742-4f90-974d-2e74ec703e44 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=GhostAdmin" [label="tool\nGhostAdmin",shape=box,style=filled,color=deepskyblue];"tool=GhostAdmin" -> "malpedia=GhostAdmin" [label="similar",dir="both"];} diff --git a/static/graphs/a68f1b43-c742-4f90-974d-2e74ec703e44.png b/static/graphs/a68f1b43-c742-4f90-974d-2e74ec703e44.png new file mode 100644 index 0000000..f5298b5 Binary files /dev/null and b/static/graphs/a68f1b43-c742-4f90-974d-2e74ec703e44.png differ diff --git a/static/graphs/a717c873-6670-447a-ba98-90db6464c07d b/static/graphs/a717c873-6670-447a-ba98-90db6464c07d new file mode 100644 index 0000000..2873414 --- /dev/null +++ b/static/graphs/a717c873-6670-447a-ba98-90db6464c07d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Qadars" [label="banker\nQadars",shape=box,style=filled,color=deepskyblue];"banker=Qadars" -> "malpedia=Qadars" [label="similar",dir="both"];} diff --git a/static/graphs/a717c873-6670-447a-ba98-90db6464c07d.png b/static/graphs/a717c873-6670-447a-ba98-90db6464c07d.png new file mode 100644 index 0000000..64053ef Binary files /dev/null and b/static/graphs/a717c873-6670-447a-ba98-90db6464c07d.png differ diff --git a/static/graphs/a71ed71f-b8f4-416d-9c57-910a42e59430 b/static/graphs/a71ed71f-b8f4-416d-9c57-910a42e59430 new file mode 100644 index 0000000..b88e5a2 --- /dev/null +++ b/static/graphs/a71ed71f-b8f4-416d-9c57-910a42e59430 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=TSCookie" [label="tool\nTSCookie",shape=box,style=filled,color=deepskyblue];"tool=TSCookie" -> "malpedia=PLEAD (Windows)" [label="similar",dir="both"];"tool=TSCookie" -> "tool=PLEAD" [label="similar",dir="both"];"tool=PLEAD" [label="tool\nPLEAD",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/a71ed71f-b8f4-416d-9c57-910a42e59430.png b/static/graphs/a71ed71f-b8f4-416d-9c57-910a42e59430.png new file mode 100644 index 0000000..423fb3d Binary files /dev/null and b/static/graphs/a71ed71f-b8f4-416d-9c57-910a42e59430.png differ diff --git a/static/graphs/a73e150f-1431-4f72-994a-4000405eff07 b/static/graphs/a73e150f-1431-4f72-994a-4000405eff07 new file mode 100644 index 0000000..8c3ca16 --- /dev/null +++ b/static/graphs/a73e150f-1431-4f72-994a-4000405eff07 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Lethic" [label="botnet\nLethic",shape=box,style=filled,color=deepskyblue];"botnet=Lethic" -> "malpedia=Lethic" [label="similar",dir="both"];} diff --git a/static/graphs/a73e150f-1431-4f72-994a-4000405eff07.png b/static/graphs/a73e150f-1431-4f72-994a-4000405eff07.png new file mode 100644 index 0000000..976a6b7 Binary files /dev/null and b/static/graphs/a73e150f-1431-4f72-994a-4000405eff07.png differ diff --git a/static/graphs/a757670d-d600-48d9-8ae9-601d42c184a5 b/static/graphs/a757670d-d600-48d9-8ae9-601d42c184a5 new file mode 100644 index 0000000..b75bc0d --- /dev/null +++ b/static/graphs/a757670d-d600-48d9-8ae9-601d42c184a5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1056" [label="mitre-pre-attack-attack-pattern\nConduct social engineering - PRE-T1056",shape=ellipse];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1056" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" [label="related-to",];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1056" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1026" [label="related-to",];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1026" [label="mitre-pre-attack-attack-pattern\nConduct social engineering - PRE-T1026",shape=ellipse];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1026" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" [label="related-to",];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" [label="mitre-pre-attack-attack-pattern\nConduct social engineering - PRE-T1045",shape=ellipse];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1026" [label="related-to",];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1056" [label="related-to",];} diff --git a/static/graphs/a757670d-d600-48d9-8ae9-601d42c184a5.png b/static/graphs/a757670d-d600-48d9-8ae9-601d42c184a5.png new file mode 100644 index 0000000..437a950 Binary files /dev/null and b/static/graphs/a757670d-d600-48d9-8ae9-601d42c184a5.png differ diff --git a/static/graphs/a766ce73-5583-48f3-b7c0-0bb43c6ef8c7 b/static/graphs/a766ce73-5583-48f3-b7c0-0bb43c6ef8c7 new file mode 100644 index 0000000..fe42376 --- /dev/null +++ b/static/graphs/a766ce73-5583-48f3-b7c0-0bb43c6ef8c7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Standard Cryptographic Protocol Mitigation - T1032" [label="mitre-enterprise-attack-course-of-action\nStandard Cryptographic Protocol Mitigation - T1032",shape=ellipse];"mitre-enterprise-attack-course-of-action=Standard Cryptographic Protocol Mitigation - T1032" -> "mitre-enterprise-attack-attack-pattern=Standard Cryptographic Protocol - T1032" [label="mitigates",];} diff --git a/static/graphs/a766ce73-5583-48f3-b7c0-0bb43c6ef8c7.png b/static/graphs/a766ce73-5583-48f3-b7c0-0bb43c6ef8c7.png new file mode 100644 index 0000000..1f5f4c9 Binary files /dev/null and b/static/graphs/a766ce73-5583-48f3-b7c0-0bb43c6ef8c7.png differ diff --git a/static/graphs/a78ae9fe-71cd-4563-9213-7b6260bd9a73 b/static/graphs/a78ae9fe-71cd-4563-9213-7b6260bd9a73 new file mode 100644 index 0000000..d415632 --- /dev/null +++ b/static/graphs/a78ae9fe-71cd-4563-9213-7b6260bd9a73 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=FIN8" [label="threat-actor\nFIN8",shape=octagon,style=filled,color=indianred1];"threat-actor=FIN8" -> "mitre-enterprise-attack-intrusion-set=FIN8 - G0061" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=FIN8 - G0061" [label="mitre-enterprise-attack-intrusion-set\nFIN8 - G0061",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=FIN8 - G0061" -> "mitre-enterprise-attack-attack-pattern=Windows Admin Shares - T1077" [label="uses",];} diff --git a/static/graphs/a78ae9fe-71cd-4563-9213-7b6260bd9a73.png b/static/graphs/a78ae9fe-71cd-4563-9213-7b6260bd9a73.png new file mode 100644 index 0000000..7cf5c3b Binary files /dev/null and b/static/graphs/a78ae9fe-71cd-4563-9213-7b6260bd9a73.png differ diff --git a/static/graphs/a7bffc6a-5b47-410b-b039-def16050adcb b/static/graphs/a7bffc6a-5b47-410b-b039-def16050adcb new file mode 100644 index 0000000..213498b --- /dev/null +++ b/static/graphs/a7bffc6a-5b47-410b-b039-def16050adcb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=KjW0rm" [label="rat\nKjW0rm",shape=box,style=filled,color=deepskyblue];"rat=KjW0rm" -> "tool=KjW0rm" [label="similar",dir="both"];"tool=KjW0rm" [label="tool\nKjW0rm",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/a7bffc6a-5b47-410b-b039-def16050adcb.png b/static/graphs/a7bffc6a-5b47-410b-b039-def16050adcb.png new file mode 100644 index 0000000..d90d494 Binary files /dev/null and b/static/graphs/a7bffc6a-5b47-410b-b039-def16050adcb.png differ diff --git a/static/graphs/a7dbd72f-8d53-48c6-a9db-d16e7648b2d4 b/static/graphs/a7dbd72f-8d53-48c6-a9db-d16e7648b2d4 new file mode 100644 index 0000000..529184b --- /dev/null +++ b/static/graphs/a7dbd72f-8d53-48c6-a9db-d16e7648b2d4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Trick Bot" [label="tool\nTrick Bot",shape=box,style=filled,color=deepskyblue];"tool=Trick Bot" -> "malpedia=TrickBot" [label="similar",dir="both"];"tool=Trick Bot" -> "banker=Trickbot" [label="similar",dir="both"];"banker=Trickbot" [label="banker\nTrickbot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/a7dbd72f-8d53-48c6-a9db-d16e7648b2d4.png b/static/graphs/a7dbd72f-8d53-48c6-a9db-d16e7648b2d4.png new file mode 100644 index 0000000..b99f527 Binary files /dev/null and b/static/graphs/a7dbd72f-8d53-48c6-a9db-d16e7648b2d4.png differ diff --git a/static/graphs/a8111fb7-d4c4-4671-a6f9-f62fea8bad60 b/static/graphs/a8111fb7-d4c4-4671-a6f9-f62fea8bad60 new file mode 100644 index 0000000..3495f53 --- /dev/null +++ b/static/graphs/a8111fb7-d4c4-4671-a6f9-f62fea8bad60 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=NanoCoreRAT" [label="tool\nNanoCoreRAT",shape=box,style=filled,color=deepskyblue];"tool=NanoCoreRAT" -> "rat=NanoCore" [label="similar",dir="both"];"rat=NanoCore" [label="rat\nNanoCore",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/a8111fb7-d4c4-4671-a6f9-f62fea8bad60.png b/static/graphs/a8111fb7-d4c4-4671-a6f9-f62fea8bad60.png new file mode 100644 index 0000000..1c4eb10 Binary files /dev/null and b/static/graphs/a8111fb7-d4c4-4671-a6f9-f62fea8bad60.png differ diff --git a/static/graphs/a8395aae-1496-417d-98ee-3ecbcd9a94a0 b/static/graphs/a8395aae-1496-417d-98ee-3ecbcd9a94a0 new file mode 100644 index 0000000..7f59406 --- /dev/null +++ b/static/graphs/a8395aae-1496-417d-98ee-3ecbcd9a94a0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Emdivi" [label="tool\nEmdivi",shape=box,style=filled,color=deepskyblue];"tool=Emdivi" -> "malpedia=Emdivi" [label="similar",dir="both"];} diff --git a/static/graphs/a8395aae-1496-417d-98ee-3ecbcd9a94a0.png b/static/graphs/a8395aae-1496-417d-98ee-3ecbcd9a94a0.png new file mode 100644 index 0000000..b414a20 Binary files /dev/null and b/static/graphs/a8395aae-1496-417d-98ee-3ecbcd9a94a0.png differ diff --git a/static/graphs/a860d257-4a39-47ec-9230-94cac67ebf7e b/static/graphs/a860d257-4a39-47ec-9230-94cac67ebf7e new file mode 100644 index 0000000..e8f1e04 --- /dev/null +++ b/static/graphs/a860d257-4a39-47ec-9230-94cac67ebf7e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=njRAT" [label="tool\nnjRAT",shape=box,style=filled,color=deepskyblue];"tool=njRAT" -> "malpedia=NjRAT" [label="similar",dir="both"];} diff --git a/static/graphs/a860d257-4a39-47ec-9230-94cac67ebf7e.png b/static/graphs/a860d257-4a39-47ec-9230-94cac67ebf7e.png new file mode 100644 index 0000000..13731af Binary files /dev/null and b/static/graphs/a860d257-4a39-47ec-9230-94cac67ebf7e.png differ diff --git a/static/graphs/a8d3d497-2da9-4797-8e0b-ed176be08654 b/static/graphs/a8d3d497-2da9-4797-8e0b-ed176be08654 new file mode 100644 index 0000000..be109bf --- /dev/null +++ b/static/graphs/a8d3d497-2da9-4797-8e0b-ed176be08654 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Wingbird - S0176" [label="mitre-enterprise-attack-malware\nWingbird - S0176",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Wingbird - S0176" -> "mitre-enterprise-attack-attack-pattern=DLL Side-Loading - T1073" [label="uses",];} diff --git a/static/graphs/a8d3d497-2da9-4797-8e0b-ed176be08654.png b/static/graphs/a8d3d497-2da9-4797-8e0b-ed176be08654.png new file mode 100644 index 0000000..e88b31f Binary files /dev/null and b/static/graphs/a8d3d497-2da9-4797-8e0b-ed176be08654.png differ diff --git a/static/graphs/a90da496-b460-47e8-92e7-cc36eb00bd9a b/static/graphs/a90da496-b460-47e8-92e7-cc36eb00bd9a new file mode 100644 index 0000000..8a1da31 --- /dev/null +++ b/static/graphs/a90da496-b460-47e8-92e7-cc36eb00bd9a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Regsvcs/Regasm Mitigation - T1121" [label="mitre-enterprise-attack-course-of-action\nRegsvcs/Regasm Mitigation - T1121",shape=ellipse];"mitre-enterprise-attack-course-of-action=Regsvcs/Regasm Mitigation - T1121" -> "mitre-enterprise-attack-attack-pattern=Regsvcs/Regasm - T1121" [label="mitigates",];} diff --git a/static/graphs/a90da496-b460-47e8-92e7-cc36eb00bd9a.png b/static/graphs/a90da496-b460-47e8-92e7-cc36eb00bd9a.png new file mode 100644 index 0000000..221ccd5 Binary files /dev/null and b/static/graphs/a90da496-b460-47e8-92e7-cc36eb00bd9a.png differ diff --git a/static/graphs/a9b44750-992c-4743-8922-129880d277ea b/static/graphs/a9b44750-992c-4743-8922-129880d277ea new file mode 100644 index 0000000..08138bd --- /dev/null +++ b/static/graphs/a9b44750-992c-4743-8922-129880d277ea @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=DragonOK" [label="threat-actor\nDragonOK",shape=octagon,style=filled,color=indianred1];"threat-actor=DragonOK" -> "mitre-enterprise-attack-intrusion-set=Moafee - G0002" [label="similar",dir="both"];"threat-actor=DragonOK" -> "mitre-enterprise-attack-intrusion-set=DragonOK - G0017" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Moafee - G0002" [label="mitre-enterprise-attack-intrusion-set\nMoafee - G0002",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Moafee - G0002" -> "mitre-enterprise-attack-attack-pattern=Binary Padding - T1009" [label="uses",];"mitre-enterprise-attack-intrusion-set=DragonOK - G0017" [label="mitre-enterprise-attack-intrusion-set\nDragonOK - G0017",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=DragonOK - G0017" -> "mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="uses",];"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "rat=PoisonIvy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "tool=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "tool=poisonivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];} diff --git a/static/graphs/a9b44750-992c-4743-8922-129880d277ea.png b/static/graphs/a9b44750-992c-4743-8922-129880d277ea.png new file mode 100644 index 0000000..9c1dbc4 Binary files /dev/null and b/static/graphs/a9b44750-992c-4743-8922-129880d277ea.png differ diff --git a/static/graphs/a9cab8f6-4c94-4c9b-9e7d-9d863ff53431 b/static/graphs/a9cab8f6-4c94-4c9b-9e7d-9d863ff53431 new file mode 100644 index 0000000..4d13829 --- /dev/null +++ b/static/graphs/a9cab8f6-4c94-4c9b-9e7d-9d863ff53431 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Malicious Media Content - MOB-T1060" [label="mitre-mobile-attack-attack-pattern\nMalicious Media Content - MOB-T1060",shape=ellipse];"mitre-mobile-attack-attack-pattern=Malicious Media Content - MOB-T1060" -> "mitre-mobile-attack-attack-pattern=Malicious Web Content - MOB-T1059" [label="revoked-by",];} diff --git a/static/graphs/a9cab8f6-4c94-4c9b-9e7d-9d863ff53431.png b/static/graphs/a9cab8f6-4c94-4c9b-9e7d-9d863ff53431.png new file mode 100644 index 0000000..92a7adf Binary files /dev/null and b/static/graphs/a9cab8f6-4c94-4c9b-9e7d-9d863ff53431.png differ diff --git a/static/graphs/aa29ae56-e54b-47a2-ad16-d3ab0242d5d7 b/static/graphs/aa29ae56-e54b-47a2-ad16-d3ab0242d5d7 new file mode 100644 index 0000000..8aebc07 --- /dev/null +++ b/static/graphs/aa29ae56-e54b-47a2-ad16-d3ab0242d5d7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=APT32" [label="threat-actor\nAPT32",shape=octagon,style=filled,color=indianred1];"threat-actor=APT32" -> "mitre-enterprise-attack-intrusion-set=APT32 - G0050" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT32 - G0050" [label="mitre-enterprise-attack-intrusion-set\nAPT32 - G0050",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT32 - G0050" -> "mitre-enterprise-attack-attack-pattern=Scheduled Task - T1053" [label="uses",];} diff --git a/static/graphs/aa29ae56-e54b-47a2-ad16-d3ab0242d5d7.png b/static/graphs/aa29ae56-e54b-47a2-ad16-d3ab0242d5d7.png new file mode 100644 index 0000000..8289d53 Binary files /dev/null and b/static/graphs/aa29ae56-e54b-47a2-ad16-d3ab0242d5d7.png differ diff --git a/static/graphs/aa3fc68c-413c-4bfb-b4cd-bca7094da985 b/static/graphs/aa3fc68c-413c-4bfb-b4cd-bca7094da985 new file mode 100644 index 0000000..add56da --- /dev/null +++ b/static/graphs/aa3fc68c-413c-4bfb-b4cd-bca7094da985 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Matrix Banker" [label="banker\nMatrix Banker",shape=box,style=filled,color=deepskyblue];"banker=Matrix Banker" -> "malpedia=Matrix Banker" [label="similar",dir="both"];} diff --git a/static/graphs/aa3fc68c-413c-4bfb-b4cd-bca7094da985.png b/static/graphs/aa3fc68c-413c-4bfb-b4cd-bca7094da985.png new file mode 100644 index 0000000..834848c Binary files /dev/null and b/static/graphs/aa3fc68c-413c-4bfb-b4cd-bca7094da985.png differ diff --git a/static/graphs/aaa92b37-f96c-4a0a-859c-b1cb6faeb13d b/static/graphs/aaa92b37-f96c-4a0a-859c-b1cb6faeb13d new file mode 100644 index 0000000..e339ca8 --- /dev/null +++ b/static/graphs/aaa92b37-f96c-4a0a-859c-b1cb6faeb13d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Graphical User Interface Mitigation - T1061" [label="mitre-enterprise-attack-course-of-action\nGraphical User Interface Mitigation - T1061",shape=ellipse];"mitre-enterprise-attack-course-of-action=Graphical User Interface Mitigation - T1061" -> "mitre-enterprise-attack-attack-pattern=Graphical User Interface - T1061" [label="mitigates",];} diff --git a/static/graphs/aaa92b37-f96c-4a0a-859c-b1cb6faeb13d.png b/static/graphs/aaa92b37-f96c-4a0a-859c-b1cb6faeb13d.png new file mode 100644 index 0000000..a17895d Binary files /dev/null and b/static/graphs/aaa92b37-f96c-4a0a-859c-b1cb6faeb13d.png differ diff --git a/static/graphs/aabd25a5-021a-49db-bda8-a922f41c678c b/static/graphs/aabd25a5-021a-49db-bda8-a922f41c678c new file mode 100644 index 0000000..f9fb6d1 --- /dev/null +++ b/static/graphs/aabd25a5-021a-49db-bda8-a922f41c678c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Coban" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/aabd25a5-021a-49db-bda8-a922f41c678c.png b/static/graphs/aabd25a5-021a-49db-bda8-a922f41c678c.png new file mode 100644 index 0000000..beaf873 Binary files /dev/null and b/static/graphs/aabd25a5-021a-49db-bda8-a922f41c678c.png differ diff --git a/static/graphs/aafea02e-ece5-4bb2-91a6-3bf8c7f38a39 b/static/graphs/aafea02e-ece5-4bb2-91a6-3bf8c7f38a39 new file mode 100644 index 0000000..b795899 --- /dev/null +++ b/static/graphs/aafea02e-ece5-4bb2-91a6-3bf8c7f38a39 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Cobalt Strike - S0154" [label="mitre-enterprise-attack-tool\nCobalt Strike - S0154",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Cobalt Strike - S0154" -> "rat=Cobalt Strike" [label="similar",dir="both"];"mitre-enterprise-attack-tool=Cobalt Strike - S0154" -> "malpedia=Cobalt Strike" [label="similar",dir="both"];"mitre-enterprise-attack-tool=Cobalt Strike - S0154" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];"rat=Cobalt Strike" [label="rat\nCobalt Strike",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/aafea02e-ece5-4bb2-91a6-3bf8c7f38a39.png b/static/graphs/aafea02e-ece5-4bb2-91a6-3bf8c7f38a39.png new file mode 100644 index 0000000..32773f2 Binary files /dev/null and b/static/graphs/aafea02e-ece5-4bb2-91a6-3bf8c7f38a39.png differ diff --git a/static/graphs/ab3580c8-8435-4117-aace-3d9fbe46aa56 b/static/graphs/ab3580c8-8435-4117-aace-3d9fbe46aa56 new file mode 100644 index 0000000..ccd6398 --- /dev/null +++ b/static/graphs/ab3580c8-8435-4117-aace-3d9fbe46aa56 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Unknown Logger - S0130" [label="mitre-enterprise-attack-malware\nUnknown Logger - S0130",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Unknown Logger - S0130" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];} diff --git a/static/graphs/ab3580c8-8435-4117-aace-3d9fbe46aa56.png b/static/graphs/ab3580c8-8435-4117-aace-3d9fbe46aa56.png new file mode 100644 index 0000000..477289e Binary files /dev/null and b/static/graphs/ab3580c8-8435-4117-aace-3d9fbe46aa56.png differ diff --git a/static/graphs/ab4694d6-7043-41f2-b328-d93bec9c1b22 b/static/graphs/ab4694d6-7043-41f2-b328-d93bec9c1b22 new file mode 100644 index 0000000..88abc66 --- /dev/null +++ b/static/graphs/ab4694d6-7043-41f2-b328-d93bec9c1b22 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Adwind" [label="tool\nAdwind",shape=box,style=filled,color=deepskyblue];"tool=Adwind" -> "rat=Adwind RAT" [label="similar",dir="both"];"tool=Adwind" -> "android=Adwind" [label="similar",dir="both"];"tool=Adwind" -> "android=Sockrat" [label="similar",dir="both"];"tool=Adwind" -> "malpedia=AdWind" [label="similar",dir="both"];"android=Adwind" [label="android\nAdwind",shape=box,style=filled,color=deepskyblue];"android=Sockrat" [label="android\nSockrat",shape=box,style=filled,color=deepskyblue];"rat=Adwind RAT" [label="rat\nAdwind RAT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ab4694d6-7043-41f2-b328-d93bec9c1b22.png b/static/graphs/ab4694d6-7043-41f2-b328-d93bec9c1b22.png new file mode 100644 index 0000000..aa51ee0 Binary files /dev/null and b/static/graphs/ab4694d6-7043-41f2-b328-d93bec9c1b22.png differ diff --git a/static/graphs/ab49815e-8ba6-41ec-9f51-8a9587334069 b/static/graphs/ab49815e-8ba6-41ec-9f51-8a9587334069 new file mode 100644 index 0000000..7e08d3b --- /dev/null +++ b/static/graphs/ab49815e-8ba6-41ec-9f51-8a9587334069 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Conficker" [label="botnet\nConficker",shape=box,style=filled,color=deepskyblue];"botnet=Conficker" -> "malpedia=Conficker" [label="similar",dir="both"];} diff --git a/static/graphs/ab49815e-8ba6-41ec-9f51-8a9587334069.png b/static/graphs/ab49815e-8ba6-41ec-9f51-8a9587334069.png new file mode 100644 index 0000000..59d08b8 Binary files /dev/null and b/static/graphs/ab49815e-8ba6-41ec-9f51-8a9587334069.png differ diff --git a/static/graphs/aba3fd7d-87cc-4266-82a1-d458ae299266 b/static/graphs/aba3fd7d-87cc-4266-82a1-d458ae299266 new file mode 100644 index 0000000..8ccd3a9 --- /dev/null +++ b/static/graphs/aba3fd7d-87cc-4266-82a1-d458ae299266 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=TEARDROP" [label="tool\nTEARDROP",shape=box,style=filled,color=deepskyblue];"tool=TEARDROP" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=TEARDROP" -> "tool=Raindrop" [label="variant-of",];"microsoft-activity-group=NOBELIUM" [label="microsoft-activity-group\nNOBELIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=NOBELIUM" -> "threat-actor=UNC2452" [label="similar",dir="both"];"microsoft-activity-group=NOBELIUM" -> "backdoor=SUNBURST" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=TEARDROP" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=GoldMax" [label="uses",];"tool=Raindrop" [label="tool\nRaindrop",shape=box,style=filled,color=deepskyblue];"tool=Raindrop" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=Raindrop" -> "tool=TEARDROP" [label="variant-of",];"backdoor=SUNBURST" [label="backdoor\nSUNBURST",shape=box,style=filled,color=deepskyblue];"backdoor=SUNBURST" -> "tool=SUNSPOT" [label="dropped-by",];"backdoor=SUNBURST" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"threat-actor=UNC2452" [label="threat-actor\nUNC2452",shape=octagon,style=filled,color=indianred1];"tool=GoldMax" [label="tool\nGoldMax",shape=box,style=filled,color=deepskyblue];"tool=GoldMax" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=SUNSPOT" [label="tool\nSUNSPOT",shape=box,style=filled,color=deepskyblue];"tool=SUNSPOT" -> "backdoor=SUNBURST" [label="dropped",];} diff --git a/static/graphs/aba3fd7d-87cc-4266-82a1-d458ae299266.png b/static/graphs/aba3fd7d-87cc-4266-82a1-d458ae299266.png new file mode 100644 index 0000000..44a6e0e Binary files /dev/null and b/static/graphs/aba3fd7d-87cc-4266-82a1-d458ae299266.png differ diff --git a/static/graphs/ac008435-af58-4f77-988a-c9b96c5920f5 b/static/graphs/ac008435-af58-4f77-988a-c9b96c5920f5 new file mode 100644 index 0000000..38fb2dd --- /dev/null +++ b/static/graphs/ac008435-af58-4f77-988a-c9b96c5920f5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=NTFS File Attributes Mitigation - T1096" [label="mitre-enterprise-attack-course-of-action\nNTFS File Attributes Mitigation - T1096",shape=ellipse];"mitre-enterprise-attack-course-of-action=NTFS File Attributes Mitigation - T1096" -> "mitre-enterprise-attack-attack-pattern=NTFS File Attributes - T1096" [label="mitigates",];} diff --git a/static/graphs/ac008435-af58-4f77-988a-c9b96c5920f5.png b/static/graphs/ac008435-af58-4f77-988a-c9b96c5920f5.png new file mode 100644 index 0000000..c6ceebe Binary files /dev/null and b/static/graphs/ac008435-af58-4f77-988a-c9b96c5920f5.png differ diff --git a/static/graphs/ac04d0b0-c6b5-4125-acd7-c58dfe7ad4cf b/static/graphs/ac04d0b0-c6b5-4125-acd7-c58dfe7ad4cf new file mode 100644 index 0000000..05535ac --- /dev/null +++ b/static/graphs/ac04d0b0-c6b5-4125-acd7-c58dfe7ad4cf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=RoyalCli" [label="tool\nRoyalCli",shape=box,style=filled,color=deepskyblue];"tool=RoyalCli" -> "malpedia=RoyalCli" [label="similar",dir="both"];} diff --git a/static/graphs/ac04d0b0-c6b5-4125-acd7-c58dfe7ad4cf.png b/static/graphs/ac04d0b0-c6b5-4125-acd7-c58dfe7ad4cf.png new file mode 100644 index 0000000..b756c6d Binary files /dev/null and b/static/graphs/ac04d0b0-c6b5-4125-acd7-c58dfe7ad4cf.png differ diff --git a/static/graphs/ac2ff27d-a7cb-46fe-ae32-cfe571dc614d b/static/graphs/ac2ff27d-a7cb-46fe-ae32-cfe571dc614d new file mode 100644 index 0000000..6fb917c --- /dev/null +++ b/static/graphs/ac2ff27d-a7cb-46fe-ae32-cfe571dc614d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Akbot" [label="tool\nAkbot",shape=box,style=filled,color=deepskyblue];"tool=Akbot" -> "banker=Qakbot" [label="similar",dir="both"];"tool=Akbot" -> "botnet=Akbot" [label="similar",dir="both"];"tool=Akbot" -> "malpedia=QakBot" [label="similar",dir="both"];"banker=Qakbot" [label="banker\nQakbot",shape=box,style=filled,color=deepskyblue];"botnet=Akbot" [label="botnet\nAkbot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ac2ff27d-a7cb-46fe-ae32-cfe571dc614d.png b/static/graphs/ac2ff27d-a7cb-46fe-ae32-cfe571dc614d.png new file mode 100644 index 0000000..f91a6cc Binary files /dev/null and b/static/graphs/ac2ff27d-a7cb-46fe-ae32-cfe571dc614d.png differ diff --git a/static/graphs/ac4bce1f-b3ec-4c44-bd36-b6cc986b319b b/static/graphs/ac4bce1f-b3ec-4c44-bd36-b6cc986b319b new file mode 100644 index 0000000..eb7a0af --- /dev/null +++ b/static/graphs/ac4bce1f-b3ec-4c44-bd36-b6cc986b319b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Temper Panda" [label="threat-actor\nTemper Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Temper Panda" -> "mitre-enterprise-attack-intrusion-set=admin@338 - G0018" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=admin@338 - G0018" [label="mitre-enterprise-attack-intrusion-set\nadmin@338 - G0018",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=admin@338 - G0018" -> "mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="uses",];"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "rat=PoisonIvy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "tool=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "tool=poisonivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];} diff --git a/static/graphs/ac4bce1f-b3ec-4c44-bd36-b6cc986b319b.png b/static/graphs/ac4bce1f-b3ec-4c44-bd36-b6cc986b319b.png new file mode 100644 index 0000000..c2f0897 Binary files /dev/null and b/static/graphs/ac4bce1f-b3ec-4c44-bd36-b6cc986b319b.png differ diff --git a/static/graphs/ac7affb8-971d-4c05-84f0-172b61d007d7 b/static/graphs/ac7affb8-971d-4c05-84f0-172b61d007d7 new file mode 100644 index 0000000..6482a6a --- /dev/null +++ b/static/graphs/ac7affb8-971d-4c05-84f0-172b61d007d7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=GoldenEye Ransomware" [label="ransomware\nGoldenEye Ransomware",shape=box,style=filled,color=deepskyblue];"ransomware=GoldenEye Ransomware" -> "ransomware=Petya" [label="similar",dir="both"];"ransomware=Petya" [label="ransomware\nPetya",shape=box,style=filled,color=deepskyblue];"ransomware=Petya" -> "malpedia=Petya" [label="similar",dir="both"];} diff --git a/static/graphs/ac7affb8-971d-4c05-84f0-172b61d007d7.png b/static/graphs/ac7affb8-971d-4c05-84f0-172b61d007d7.png new file mode 100644 index 0000000..030dc9b Binary files /dev/null and b/static/graphs/ac7affb8-971d-4c05-84f0-172b61d007d7.png differ diff --git a/static/graphs/acbb5cad-ffe7-4b0e-a57a-2dbc916e8905 b/static/graphs/acbb5cad-ffe7-4b0e-a57a-2dbc916e8905 new file mode 100644 index 0000000..4bac480 --- /dev/null +++ b/static/graphs/acbb5cad-ffe7-4b0e-a57a-2dbc916e8905 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Operation C-Major" [label="threat-actor\nOperation C-Major",shape=octagon,style=filled,color=indianred1];"threat-actor=Operation C-Major" -> "microsoft-activity-group=https://www.cfr.org/interactive/cyber-operations/mythic-leopard" [label="similar",dir="both"];"microsoft-activity-group=https://www.cfr.org/interactive/cyber-operations/mythic-leopard" [label="microsoft-activity-group\nhttps://www.cfr.org/interactive/cyber-operations/mythic-leopard",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/acbb5cad-ffe7-4b0e-a57a-2dbc916e8905.png b/static/graphs/acbb5cad-ffe7-4b0e-a57a-2dbc916e8905.png new file mode 100644 index 0000000..81fbc0b Binary files /dev/null and b/static/graphs/acbb5cad-ffe7-4b0e-a57a-2dbc916e8905.png differ diff --git a/static/graphs/accd848b-b8f4-46ba-a408-9063b35cfbf2 b/static/graphs/accd848b-b8f4-46ba-a408-9063b35cfbf2 new file mode 100644 index 0000000..edb115f --- /dev/null +++ b/static/graphs/accd848b-b8f4-46ba-a408-9063b35cfbf2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=MAGNALLIUM" [label="threat-actor\nMAGNALLIUM",shape=octagon,style=filled,color=indianred1];"threat-actor=MAGNALLIUM" -> "mitre-enterprise-attack-intrusion-set=APT33 - G0064" [label="similar",dir="both"];"threat-actor=MAGNALLIUM" -> "threat-actor=APT33" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT33 - G0064" [label="mitre-enterprise-attack-intrusion-set\nAPT33 - G0064",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT33 - G0064" -> "mitre-enterprise-attack-attack-pattern=Spearphishing Link - T1192" [label="uses",];"threat-actor=APT33" [label="threat-actor\nAPT33",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/accd848b-b8f4-46ba-a408-9063b35cfbf2.png b/static/graphs/accd848b-b8f4-46ba-a408-9063b35cfbf2.png new file mode 100644 index 0000000..c44f712 Binary files /dev/null and b/static/graphs/accd848b-b8f4-46ba-a408-9063b35cfbf2.png differ diff --git a/static/graphs/ace4daee-f914-4707-be75-843f16da2edf b/static/graphs/ace4daee-f914-4707-be75-843f16da2edf new file mode 100644 index 0000000..ec02b68 --- /dev/null +++ b/static/graphs/ace4daee-f914-4707-be75-843f16da2edf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Bash History Mitigation - T1139" [label="mitre-enterprise-attack-course-of-action\nBash History Mitigation - T1139",shape=ellipse];"mitre-enterprise-attack-course-of-action=Bash History Mitigation - T1139" -> "mitre-enterprise-attack-attack-pattern=Bash History - T1139" [label="mitigates",];} diff --git a/static/graphs/ace4daee-f914-4707-be75-843f16da2edf.png b/static/graphs/ace4daee-f914-4707-be75-843f16da2edf.png new file mode 100644 index 0000000..6526118 Binary files /dev/null and b/static/graphs/ace4daee-f914-4707-be75-843f16da2edf.png differ diff --git a/static/graphs/ad4f146f-e3ec-444a-ba71-24bffd7f0f8e b/static/graphs/ad4f146f-e3ec-444a-ba71-24bffd7f0f8e new file mode 100644 index 0000000..20c0090 --- /dev/null +++ b/static/graphs/ad4f146f-e3ec-444a-ba71-24bffd7f0f8e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=RIPTIDE - S0003" [label="mitre-enterprise-attack-malware\nRIPTIDE - S0003",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RIPTIDE - S0003" -> "tool=Etumbot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RIPTIDE - S0003" -> "mitre-enterprise-attack-attack-pattern=Commonly Used Port - T1043" [label="uses",];"tool=Etumbot" [label="tool\nEtumbot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ad4f146f-e3ec-444a-ba71-24bffd7f0f8e.png b/static/graphs/ad4f146f-e3ec-444a-ba71-24bffd7f0f8e.png new file mode 100644 index 0000000..e421e34 Binary files /dev/null and b/static/graphs/ad4f146f-e3ec-444a-ba71-24bffd7f0f8e.png differ diff --git a/static/graphs/ad6a1b4a-6d79-40d4-adb7-1d7ca697347e b/static/graphs/ad6a1b4a-6d79-40d4-adb7-1d7ca697347e new file mode 100644 index 0000000..88959e8 --- /dev/null +++ b/static/graphs/ad6a1b4a-6d79-40d4-adb7-1d7ca697347e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=RedLeaves" [label="rat\nRedLeaves",shape=box,style=filled,color=deepskyblue];"rat=RedLeaves" -> "mitre-enterprise-attack-malware=RedLeaves - S0153" [label="similar",dir="both"];"rat=RedLeaves" -> "tool=BUGJUICE" [label="similar",dir="both"];"rat=RedLeaves" -> "malpedia=RedLeaves" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RedLeaves - S0153" [label="mitre-enterprise-attack-malware\nRedLeaves - S0153",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RedLeaves - S0153" -> "mitre-enterprise-attack-attack-pattern=System Network Connections Discovery - T1049" [label="uses",];"tool=BUGJUICE" [label="tool\nBUGJUICE",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ad6a1b4a-6d79-40d4-adb7-1d7ca697347e.png b/static/graphs/ad6a1b4a-6d79-40d4-adb7-1d7ca697347e.png new file mode 100644 index 0000000..53e470e Binary files /dev/null and b/static/graphs/ad6a1b4a-6d79-40d4-adb7-1d7ca697347e.png differ diff --git a/static/graphs/ad7f983d-d5a8-4fce-a38c-b68eda61bf4e b/static/graphs/ad7f983d-d5a8-4fce-a38c-b68eda61bf4e new file mode 100644 index 0000000..794caa5 --- /dev/null +++ b/static/graphs/ad7f983d-d5a8-4fce-a38c-b68eda61bf4e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Spearphishing Link Mitigation - T1192" [label="mitre-enterprise-attack-course-of-action\nSpearphishing Link Mitigation - T1192",shape=ellipse];"mitre-enterprise-attack-course-of-action=Spearphishing Link Mitigation - T1192" -> "mitre-enterprise-attack-attack-pattern=Spearphishing Link - T1192" [label="mitigates",];} diff --git a/static/graphs/ad7f983d-d5a8-4fce-a38c-b68eda61bf4e.png b/static/graphs/ad7f983d-d5a8-4fce-a38c-b68eda61bf4e.png new file mode 100644 index 0000000..877b4de Binary files /dev/null and b/static/graphs/ad7f983d-d5a8-4fce-a38c-b68eda61bf4e.png differ diff --git a/static/graphs/ada08ea8-4517-4eea-aff1-3ad69e5466bb b/static/graphs/ada08ea8-4517-4eea-aff1-3ad69e5466bb new file mode 100644 index 0000000..2f2ac58 --- /dev/null +++ b/static/graphs/ada08ea8-4517-4eea-aff1-3ad69e5466bb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=NEODYMIUM" [label="threat-actor\nNEODYMIUM",shape=octagon,style=filled,color=indianred1];"threat-actor=NEODYMIUM" -> "mitre-enterprise-attack-intrusion-set=NEODYMIUM - G0055" [label="similar",dir="both"];"threat-actor=NEODYMIUM" -> "microsoft-activity-group=NEODYMIUM" [label="similar",dir="both"];"microsoft-activity-group=NEODYMIUM" [label="microsoft-activity-group\nNEODYMIUM",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=NEODYMIUM - G0055" [label="mitre-enterprise-attack-intrusion-set\nNEODYMIUM - G0055",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=NEODYMIUM - G0055" -> "mitre-enterprise-attack-malware=Wingbird - S0176" [label="uses",];"mitre-enterprise-attack-malware=Wingbird - S0176" [label="mitre-enterprise-attack-malware\nWingbird - S0176",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Wingbird - S0176" -> "mitre-enterprise-attack-attack-pattern=DLL Side-Loading - T1073" [label="uses",];} diff --git a/static/graphs/ada08ea8-4517-4eea-aff1-3ad69e5466bb.png b/static/graphs/ada08ea8-4517-4eea-aff1-3ad69e5466bb.png new file mode 100644 index 0000000..ae51bbc Binary files /dev/null and b/static/graphs/ada08ea8-4517-4eea-aff1-3ad69e5466bb.png differ diff --git a/static/graphs/add6554a-815a-4ac3-9b22-9337b9661ab8 b/static/graphs/add6554a-815a-4ac3-9b22-9337b9661ab8 new file mode 100644 index 0000000..8e3ffde --- /dev/null +++ b/static/graphs/add6554a-815a-4ac3-9b22-9337b9661ab8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Tick" [label="threat-actor\nTick",shape=octagon,style=filled,color=indianred1];"threat-actor=Tick" -> "mitre-enterprise-attack-intrusion-set=BRONZE BUTLER - G0060" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=BRONZE BUTLER - G0060" [label="mitre-enterprise-attack-intrusion-set\nBRONZE BUTLER - G0060",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=BRONZE BUTLER - G0060" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];} diff --git a/static/graphs/add6554a-815a-4ac3-9b22-9337b9661ab8.png b/static/graphs/add6554a-815a-4ac3-9b22-9337b9661ab8.png new file mode 100644 index 0000000..87d69ba Binary files /dev/null and b/static/graphs/add6554a-815a-4ac3-9b22-9337b9661ab8.png differ diff --git a/static/graphs/addb3703-5a59-4461-9bcd-7e2b5d4e92a0 b/static/graphs/addb3703-5a59-4461-9bcd-7e2b5d4e92a0 new file mode 100644 index 0000000..fbd2a45 --- /dev/null +++ b/static/graphs/addb3703-5a59-4461-9bcd-7e2b5d4e92a0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Standard Application Layer Protocol Mitigation - T1071" [label="mitre-enterprise-attack-course-of-action\nStandard Application Layer Protocol Mitigation - T1071",shape=ellipse];"mitre-enterprise-attack-course-of-action=Standard Application Layer Protocol Mitigation - T1071" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="mitigates",];} diff --git a/static/graphs/addb3703-5a59-4461-9bcd-7e2b5d4e92a0.png b/static/graphs/addb3703-5a59-4461-9bcd-7e2b5d4e92a0.png new file mode 100644 index 0000000..d1e6cdf Binary files /dev/null and b/static/graphs/addb3703-5a59-4461-9bcd-7e2b5d4e92a0.png differ diff --git a/static/graphs/ae41895a-243f-4a65-b99b-d85022326c31 b/static/graphs/ae41895a-243f-4a65-b99b-d85022326c31 new file mode 100644 index 0000000..bc48401 --- /dev/null +++ b/static/graphs/ae41895a-243f-4a65-b99b-d85022326c31 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Dust Storm - G0031" [label="mitre-enterprise-attack-intrusion-set\nDust Storm - G0031",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Dust Storm - G0031" -> "threat-actor=Dust Storm" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Dust Storm - G0031" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];"threat-actor=Dust Storm" [label="threat-actor\nDust Storm",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/ae41895a-243f-4a65-b99b-d85022326c31.png b/static/graphs/ae41895a-243f-4a65-b99b-d85022326c31.png new file mode 100644 index 0000000..114351e Binary files /dev/null and b/static/graphs/ae41895a-243f-4a65-b99b-d85022326c31.png differ diff --git a/static/graphs/ae99314d-0810-4b46-8ee8-4af7cdb146d0 b/static/graphs/ae99314d-0810-4b46-8ee8-4af7cdb146d0 new file mode 100644 index 0000000..dbdc124 --- /dev/null +++ b/static/graphs/ae99314d-0810-4b46-8ee8-4af7cdb146d0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Intrusion Attempts:Exploitation of known Vulnerabilities" [label="rsit\nIntrusion Attempts:Exploitation of known Vulnerabilities",shape=ellipse];"rsit=Intrusion Attempts:Exploitation of known Vulnerabilities" -> "mitre-enterprise-attack-attack-pattern=Exploit Public-Facing Application - T1190" [label="similar",dir="both"];"rsit=Intrusion Attempts:Exploitation of known Vulnerabilities" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Client Execution - T1203" [label="similar",dir="both"];"rsit=Intrusion Attempts:Exploitation of known Vulnerabilities" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Defense Evasion - T1211" [label="similar",dir="both"];"rsit=Intrusion Attempts:Exploitation of known Vulnerabilities" -> "mitre-enterprise-attack-attack-pattern=Exploitation of Remote Services - T1210" [label="similar",dir="both"];} diff --git a/static/graphs/ae99314d-0810-4b46-8ee8-4af7cdb146d0.png b/static/graphs/ae99314d-0810-4b46-8ee8-4af7cdb146d0.png new file mode 100644 index 0000000..d404a9a Binary files /dev/null and b/static/graphs/ae99314d-0810-4b46-8ee8-4af7cdb146d0.png differ diff --git a/static/graphs/ae9d818d-95d0-41da-b045-9cabea1ca164 b/static/graphs/ae9d818d-95d0-41da-b045-9cabea1ca164 new file mode 100644 index 0000000..04a58b8 --- /dev/null +++ b/static/graphs/ae9d818d-95d0-41da-b045-9cabea1ca164 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=PinchDuke - S0048" [label="mitre-enterprise-attack-malware\nPinchDuke - S0048",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PinchDuke - S0048" -> "mitre-enterprise-attack-attack-pattern=Data from Local System - T1005" [label="uses",];} diff --git a/static/graphs/ae9d818d-95d0-41da-b045-9cabea1ca164.png b/static/graphs/ae9d818d-95d0-41da-b045-9cabea1ca164.png new file mode 100644 index 0000000..670b68c Binary files /dev/null and b/static/graphs/ae9d818d-95d0-41da-b045-9cabea1ca164.png differ diff --git a/static/graphs/aef0fdd4-38b6-11e8-afdd-3b6145112467 b/static/graphs/aef0fdd4-38b6-11e8-afdd-3b6145112467 new file mode 100644 index 0000000..01b1d64 --- /dev/null +++ b/static/graphs/aef0fdd4-38b6-11e8-afdd-3b6145112467 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=KillDisk Wiper" [label="tool\nKillDisk Wiper",shape=box,style=filled,color=deepskyblue];"tool=KillDisk Wiper" -> "malpedia=KillDisk" [label="similar",dir="both"];} diff --git a/static/graphs/aef0fdd4-38b6-11e8-afdd-3b6145112467.png b/static/graphs/aef0fdd4-38b6-11e8-afdd-3b6145112467.png new file mode 100644 index 0000000..633df5d Binary files /dev/null and b/static/graphs/aef0fdd4-38b6-11e8-afdd-3b6145112467.png differ diff --git a/static/graphs/aeff5887-8f9e-48d5-a523-9b395e2ce80a b/static/graphs/aeff5887-8f9e-48d5-a523-9b395e2ce80a new file mode 100644 index 0000000..673234e --- /dev/null +++ b/static/graphs/aeff5887-8f9e-48d5-a523-9b395e2ce80a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Credential Dumping Mitigation - T1003" [label="mitre-enterprise-attack-course-of-action\nCredential Dumping Mitigation - T1003",shape=ellipse];"mitre-enterprise-attack-course-of-action=Credential Dumping Mitigation - T1003" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="mitigates",];} diff --git a/static/graphs/aeff5887-8f9e-48d5-a523-9b395e2ce80a.png b/static/graphs/aeff5887-8f9e-48d5-a523-9b395e2ce80a.png new file mode 100644 index 0000000..8bfb624 Binary files /dev/null and b/static/graphs/aeff5887-8f9e-48d5-a523-9b395e2ce80a.png differ diff --git a/static/graphs/af093bc8-7b59-4e2a-9da8-8e839b4c50c6 b/static/graphs/af093bc8-7b59-4e2a-9da8-8e839b4c50c6 new file mode 100644 index 0000000..dab5ed9 --- /dev/null +++ b/static/graphs/af093bc8-7b59-4e2a-9da8-8e839b4c50c6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Remote Access Tools Mitigation - T1219" [label="mitre-enterprise-attack-course-of-action\nRemote Access Tools Mitigation - T1219",shape=ellipse];"mitre-enterprise-attack-course-of-action=Remote Access Tools Mitigation - T1219" -> "mitre-enterprise-attack-attack-pattern=Remote Access Tools - T1219" [label="mitigates",];} diff --git a/static/graphs/af093bc8-7b59-4e2a-9da8-8e839b4c50c6.png b/static/graphs/af093bc8-7b59-4e2a-9da8-8e839b4c50c6.png new file mode 100644 index 0000000..7e588c5 Binary files /dev/null and b/static/graphs/af093bc8-7b59-4e2a-9da8-8e839b4c50c6.png differ diff --git a/static/graphs/af2ad3b7-ab6a-4807-91fd-51bcaff9acbb b/static/graphs/af2ad3b7-ab6a-4807-91fd-51bcaff9acbb new file mode 100644 index 0000000..e260983 --- /dev/null +++ b/static/graphs/af2ad3b7-ab6a-4807-91fd-51bcaff9acbb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=USBStealer - S0136" [label="mitre-enterprise-attack-malware\nUSBStealer - S0136",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=USBStealer - S0136" -> "tool=USBStealer" [label="similar",dir="both"];"mitre-enterprise-attack-malware=USBStealer - S0136" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];"tool=USBStealer" [label="tool\nUSBStealer",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/af2ad3b7-ab6a-4807-91fd-51bcaff9acbb.png b/static/graphs/af2ad3b7-ab6a-4807-91fd-51bcaff9acbb.png new file mode 100644 index 0000000..5c7bcf9 Binary files /dev/null and b/static/graphs/af2ad3b7-ab6a-4807-91fd-51bcaff9acbb.png differ diff --git a/static/graphs/af358cad-eb71-4e91-a752-236edc237dae b/static/graphs/af358cad-eb71-4e91-a752-236edc237dae new file mode 100644 index 0000000..0108b5e --- /dev/null +++ b/static/graphs/af358cad-eb71-4e91-a752-236edc237dae @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" [label="mitre-pre-attack-attack-pattern\nConduct social engineering - PRE-T1045",shape=ellipse];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1026" [label="related-to",];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1056" [label="related-to",];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1026" [label="mitre-pre-attack-attack-pattern\nConduct social engineering - PRE-T1026",shape=ellipse];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1026" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" [label="related-to",];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1056" [label="mitre-pre-attack-attack-pattern\nConduct social engineering - PRE-T1056",shape=ellipse];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1056" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1045" [label="related-to",];"mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1056" -> "mitre-pre-attack-attack-pattern=Conduct social engineering - PRE-T1026" [label="related-to",];} diff --git a/static/graphs/af358cad-eb71-4e91-a752-236edc237dae.png b/static/graphs/af358cad-eb71-4e91-a752-236edc237dae.png new file mode 100644 index 0000000..9e489aa Binary files /dev/null and b/static/graphs/af358cad-eb71-4e91-a752-236edc237dae.png differ diff --git a/static/graphs/af50d07e-3fc5-4014-9ac5-f5466cf042bc b/static/graphs/af50d07e-3fc5-4014-9ac5-f5466cf042bc new file mode 100644 index 0000000..d0b5e5a --- /dev/null +++ b/static/graphs/af50d07e-3fc5-4014-9ac5-f5466cf042bc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Bandarchor" [label="ransomware\nBandarchor",shape=box,style=filled,color=deepskyblue];"ransomware=Bandarchor" -> "ransomware=Rakhni" [label="similar",dir="both"];"ransomware=Rakhni" [label="ransomware\nRakhni",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/af50d07e-3fc5-4014-9ac5-f5466cf042bc.png b/static/graphs/af50d07e-3fc5-4014-9ac5-f5466cf042bc.png new file mode 100644 index 0000000..4423fdf Binary files /dev/null and b/static/graphs/af50d07e-3fc5-4014-9ac5-f5466cf042bc.png differ diff --git a/static/graphs/afc079f3-c0ea-4096-b75d-3f05338b7f60 b/static/graphs/afc079f3-c0ea-4096-b75d-3f05338b7f60 new file mode 100644 index 0000000..8576cba --- /dev/null +++ b/static/graphs/afc079f3-c0ea-4096-b75d-3f05338b7f60 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Mimikatz - S0002" [label="mitre-enterprise-attack-tool\nMimikatz - S0002",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Mimikatz - S0002" -> "tool=Mimikatz" [label="similar",dir="both"];"mitre-enterprise-attack-tool=Mimikatz - S0002" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];"tool=Mimikatz" [label="tool\nMimikatz",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/afc079f3-c0ea-4096-b75d-3f05338b7f60.png b/static/graphs/afc079f3-c0ea-4096-b75d-3f05338b7f60.png new file mode 100644 index 0000000..6bb3411 Binary files /dev/null and b/static/graphs/afc079f3-c0ea-4096-b75d-3f05338b7f60.png differ diff --git a/static/graphs/b06c3af1-0243-4428-88da-b3451c345e1e b/static/graphs/b06c3af1-0243-4428-88da-b3451c345e1e new file mode 100644 index 0000000..b036b47 --- /dev/null +++ b/static/graphs/b06c3af1-0243-4428-88da-b3451c345e1e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Operation Sharpshooter" [label="threat-actor\nOperation Sharpshooter",shape=octagon,style=filled,color=indianred1];"threat-actor=Operation Sharpshooter" -> "threat-actor=Lazarus Group" [label="similar",dir="both"];"threat-actor=Lazarus Group" [label="threat-actor\nLazarus Group",shape=octagon,style=filled,color=indianred1];"threat-actor=Lazarus Group" -> "mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" [label="similar",dir="both"];"threat-actor=Lazarus Group" -> "threat-actor=APT37" [label="linked-to",];"mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" [label="mitre-enterprise-attack-intrusion-set\nLazarus Group - G0032",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" -> "mitre-enterprise-attack-attack-pattern=Windows Admin Shares - T1077" [label="uses",];"threat-actor=APT37" [label="threat-actor\nAPT37",shape=octagon,style=filled,color=indianred1];"threat-actor=APT37" -> "mitre-enterprise-attack-intrusion-set=APT37 - G0067" [label="similar",dir="both"];"threat-actor=APT37" -> "threat-actor=Lazarus Group" [label="linked-to",];"mitre-enterprise-attack-intrusion-set=APT37 - G0067" [label="mitre-enterprise-attack-intrusion-set\nAPT37 - G0067",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT37 - G0067" -> "mitre-enterprise-attack-attack-pattern=Custom Command and Control Protocol - T1094" [label="uses",];} diff --git a/static/graphs/b06c3af1-0243-4428-88da-b3451c345e1e.png b/static/graphs/b06c3af1-0243-4428-88da-b3451c345e1e.png new file mode 100644 index 0000000..fe4888d Binary files /dev/null and b/static/graphs/b06c3af1-0243-4428-88da-b3451c345e1e.png differ diff --git a/static/graphs/b07c2c47-fefb-4d7c-a69e-6a3296171f54 b/static/graphs/b07c2c47-fefb-4d7c-a69e-6a3296171f54 new file mode 100644 index 0000000..5120ccf --- /dev/null +++ b/static/graphs/b07c2c47-fefb-4d7c-a69e-6a3296171f54 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=gsecdump - S0008" [label="mitre-enterprise-attack-tool\ngsecdump - S0008",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=gsecdump - S0008" -> "malpedia=gsecdump" [label="similar",dir="both"];"mitre-enterprise-attack-tool=gsecdump - S0008" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];} diff --git a/static/graphs/b07c2c47-fefb-4d7c-a69e-6a3296171f54.png b/static/graphs/b07c2c47-fefb-4d7c-a69e-6a3296171f54.png new file mode 100644 index 0000000..3cf85c6 Binary files /dev/null and b/static/graphs/b07c2c47-fefb-4d7c-a69e-6a3296171f54.png differ diff --git a/static/graphs/b0980068-8827-4bde-83c4-9ad70bc675e9 b/static/graphs/b0980068-8827-4bde-83c4-9ad70bc675e9 new file mode 100644 index 0000000..4f9ddf9 --- /dev/null +++ b/static/graphs/b0980068-8827-4bde-83c4-9ad70bc675e9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Intrusions:Application Compromise" [label="rsit\nIntrusions:Application Compromise",shape=ellipse];"rsit=Intrusions:Application Compromise" -> "mitre-enterprise-attack-attack-pattern=Exploit Public-Facing Application - T1190" [label="similar",dir="both"];} diff --git a/static/graphs/b0980068-8827-4bde-83c4-9ad70bc675e9.png b/static/graphs/b0980068-8827-4bde-83c4-9ad70bc675e9.png new file mode 100644 index 0000000..495ac34 Binary files /dev/null and b/static/graphs/b0980068-8827-4bde-83c4-9ad70bc675e9.png differ diff --git a/static/graphs/b0f13390-cec7-4814-b37c-ccec01887faa b/static/graphs/b0f13390-cec7-4814-b37c-ccec01887faa new file mode 100644 index 0000000..2627d37 --- /dev/null +++ b/static/graphs/b0f13390-cec7-4814-b37c-ccec01887faa @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=CCBkdr - S0222" [label="mitre-enterprise-attack-malware\nCCBkdr - S0222",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CCBkdr - S0222" -> "mitre-enterprise-attack-attack-pattern=Supply Chain Compromise - T1195" [label="uses",];} diff --git a/static/graphs/b0f13390-cec7-4814-b37c-ccec01887faa.png b/static/graphs/b0f13390-cec7-4814-b37c-ccec01887faa.png new file mode 100644 index 0000000..ab2e364 Binary files /dev/null and b/static/graphs/b0f13390-cec7-4814-b37c-ccec01887faa.png differ diff --git a/static/graphs/b136d088-a829-432c-ac26-5529c26d4c7e b/static/graphs/b136d088-a829-432c-ac26-5529c26d4c7e new file mode 100644 index 0000000..a27e4af --- /dev/null +++ b/static/graphs/b136d088-a829-432c-ac26-5529c26d4c7e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=OnionDuke - S0052" [label="mitre-enterprise-attack-malware\nOnionDuke - S0052",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=OnionDuke - S0052" -> "malpedia=OnionDuke" [label="similar",dir="both"];"mitre-enterprise-attack-malware=OnionDuke - S0052" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];} diff --git a/static/graphs/b136d088-a829-432c-ac26-5529c26d4c7e.png b/static/graphs/b136d088-a829-432c-ac26-5529c26d4c7e.png new file mode 100644 index 0000000..394eabd Binary files /dev/null and b/static/graphs/b136d088-a829-432c-ac26-5529c26d4c7e.png differ diff --git a/static/graphs/b143dfa4-e944-43ff-8429-bfffc308c517 b/static/graphs/b143dfa4-e944-43ff-8429-bfffc308c517 new file mode 100644 index 0000000..ac31d1d --- /dev/null +++ b/static/graphs/b143dfa4-e944-43ff-8429-bfffc308c517 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Taidoor - S0011" [label="mitre-enterprise-attack-malware\nTaidoor - S0011",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Taidoor - S0011" -> "tool=Taidoor" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Taidoor - S0011" -> "mitre-enterprise-attack-attack-pattern=Custom Cryptographic Protocol - T1024" [label="uses",];"tool=Taidoor" [label="tool\nTaidoor",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/b143dfa4-e944-43ff-8429-bfffc308c517.png b/static/graphs/b143dfa4-e944-43ff-8429-bfffc308c517.png new file mode 100644 index 0000000..b02c7bf Binary files /dev/null and b/static/graphs/b143dfa4-e944-43ff-8429-bfffc308c517.png differ diff --git a/static/graphs/b1de6916-7a22-4460-8d26-6b5483ffaa2a b/static/graphs/b1de6916-7a22-4460-8d26-6b5483ffaa2a new file mode 100644 index 0000000..f562097 --- /dev/null +++ b/static/graphs/b1de6916-7a22-4460-8d26-6b5483ffaa2a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=SHIPSHAPE - S0028" [label="mitre-enterprise-attack-malware\nSHIPSHAPE - S0028",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SHIPSHAPE - S0028" -> "mitre-enterprise-attack-attack-pattern=Replication Through Removable Media - T1091" [label="uses",];} diff --git a/static/graphs/b1de6916-7a22-4460-8d26-6b5483ffaa2a.png b/static/graphs/b1de6916-7a22-4460-8d26-6b5483ffaa2a.png new file mode 100644 index 0000000..b585d7e Binary files /dev/null and b/static/graphs/b1de6916-7a22-4460-8d26-6b5483ffaa2a.png differ diff --git a/static/graphs/b2056ff0-00b9-482e-b11c-c771daa5f28a b/static/graphs/b2056ff0-00b9-482e-b11c-c771daa5f28a new file mode 100644 index 0000000..4b16dbf --- /dev/null +++ b/static/graphs/b2056ff0-00b9-482e-b11c-c771daa5f28a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=APT 29" [label="threat-actor\nAPT 29",shape=octagon,style=filled,color=indianred1];"threat-actor=APT 29" -> "mitre-enterprise-attack-intrusion-set=APT29 - G0016" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT29 - G0016" [label="mitre-enterprise-attack-intrusion-set\nAPT29 - G0016",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT29 - G0016" -> "mitre-enterprise-attack-attack-pattern=Bypass User Account Control - T1088" [label="uses",];} diff --git a/static/graphs/b2056ff0-00b9-482e-b11c-c771daa5f28a.png b/static/graphs/b2056ff0-00b9-482e-b11c-c771daa5f28a.png new file mode 100644 index 0000000..346431f Binary files /dev/null and b/static/graphs/b2056ff0-00b9-482e-b11c-c771daa5f28a.png differ diff --git a/static/graphs/b2203c59-4089-4ee4-bfe1-28fa25f0dbfe b/static/graphs/b2203c59-4089-4ee4-bfe1-28fa25f0dbfe new file mode 100644 index 0000000..8f53c46 --- /dev/null +++ b/static/graphs/b2203c59-4089-4ee4-bfe1-28fa25f0dbfe @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Cherry Picker - S0107" [label="mitre-enterprise-attack-malware\nCherry Picker - S0107",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Cherry Picker - S0107" -> "mitre-enterprise-attack-attack-pattern=AppInit DLLs - T1103" [label="uses",];} diff --git a/static/graphs/b2203c59-4089-4ee4-bfe1-28fa25f0dbfe.png b/static/graphs/b2203c59-4089-4ee4-bfe1-28fa25f0dbfe.png new file mode 100644 index 0000000..66c504b Binary files /dev/null and b/static/graphs/b2203c59-4089-4ee4-bfe1-28fa25f0dbfe.png differ diff --git a/static/graphs/b22cafb4-ccef-4935-82f4-631a6e539b8e b/static/graphs/b22cafb4-ccef-4935-82f4-631a6e539b8e new file mode 100644 index 0000000..967c5f3 --- /dev/null +++ b/static/graphs/b22cafb4-ccef-4935-82f4-631a6e539b8e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Polyglot" [label="ransomware\nPolyglot",shape=box,style=filled,color=deepskyblue];"ransomware=Polyglot" -> "malpedia=Polyglot" [label="similar",dir="both"];} diff --git a/static/graphs/b22cafb4-ccef-4935-82f4-631a6e539b8e.png b/static/graphs/b22cafb4-ccef-4935-82f4-631a6e539b8e.png new file mode 100644 index 0000000..da2d806 Binary files /dev/null and b/static/graphs/b22cafb4-ccef-4935-82f4-631a6e539b8e.png differ diff --git a/static/graphs/b2c5d3ca-b43a-4888-ad8d-e2d43497bf85 b/static/graphs/b2c5d3ca-b43a-4888-ad8d-e2d43497bf85 new file mode 100644 index 0000000..ff22b71 --- /dev/null +++ b/static/graphs/b2c5d3ca-b43a-4888-ad8d-e2d43497bf85 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=P2P ZeuS - S0016" [label="mitre-enterprise-attack-malware\nP2P ZeuS - S0016",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=P2P ZeuS - S0016" -> "mitre-enterprise-attack-attack-pattern=Data Obfuscation - T1001" [label="uses",];} diff --git a/static/graphs/b2c5d3ca-b43a-4888-ad8d-e2d43497bf85.png b/static/graphs/b2c5d3ca-b43a-4888-ad8d-e2d43497bf85.png new file mode 100644 index 0000000..e43466f Binary files /dev/null and b/static/graphs/b2c5d3ca-b43a-4888-ad8d-e2d43497bf85.png differ diff --git a/static/graphs/b2ec1f16-2a76-4910-adc5-ecb3570e7c1a b/static/graphs/b2ec1f16-2a76-4910-adc5-ecb3570e7c1a new file mode 100644 index 0000000..dfbd09c --- /dev/null +++ b/static/graphs/b2ec1f16-2a76-4910-adc5-ecb3570e7c1a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Qakbot" [label="banker\nQakbot",shape=box,style=filled,color=deepskyblue];"banker=Qakbot" -> "tool=Akbot" [label="similar",dir="both"];"banker=Qakbot" -> "malpedia=QakBot" [label="similar",dir="both"];"tool=Akbot" [label="tool\nAkbot",shape=box,style=filled,color=deepskyblue];"tool=Akbot" -> "botnet=Akbot" [label="similar",dir="both"];"botnet=Akbot" [label="botnet\nAkbot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/b2ec1f16-2a76-4910-adc5-ecb3570e7c1a.png b/static/graphs/b2ec1f16-2a76-4910-adc5-ecb3570e7c1a.png new file mode 100644 index 0000000..170ae66 Binary files /dev/null and b/static/graphs/b2ec1f16-2a76-4910-adc5-ecb3570e7c1a.png differ diff --git a/static/graphs/b35068ec-107a-4266-bda8-eb7036267aea b/static/graphs/b35068ec-107a-4266-bda8-eb7036267aea new file mode 100644 index 0000000..235cad1 --- /dev/null +++ b/static/graphs/b35068ec-107a-4266-bda8-eb7036267aea @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=nbtstat - S0102" [label="mitre-enterprise-attack-tool\nnbtstat - S0102",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=nbtstat - S0102" -> "mitre-enterprise-attack-attack-pattern=System Network Connections Discovery - T1049" [label="uses",];} diff --git a/static/graphs/b35068ec-107a-4266-bda8-eb7036267aea.png b/static/graphs/b35068ec-107a-4266-bda8-eb7036267aea.png new file mode 100644 index 0000000..033bcb1 Binary files /dev/null and b/static/graphs/b35068ec-107a-4266-bda8-eb7036267aea.png differ diff --git a/static/graphs/b35b1ca2-f99c-4495-97a5-b8f30225cb90 b/static/graphs/b35b1ca2-f99c-4495-97a5-b8f30225cb90 new file mode 100644 index 0000000..71e7686 --- /dev/null +++ b/static/graphs/b35b1ca2-f99c-4495-97a5-b8f30225cb90 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoLocker" [label="ransomware\nCryptoLocker",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoLocker" -> "malpedia=CryptoLocker" [label="similar",dir="both"];} diff --git a/static/graphs/b35b1ca2-f99c-4495-97a5-b8f30225cb90.png b/static/graphs/b35b1ca2-f99c-4495-97a5-b8f30225cb90.png new file mode 100644 index 0000000..a49daec Binary files /dev/null and b/static/graphs/b35b1ca2-f99c-4495-97a5-b8f30225cb90.png differ diff --git a/static/graphs/b3714d59-b61e-4713-903a-9b4f04ae7f3d b/static/graphs/b3714d59-b61e-4713-903a-9b4f04ae7f3d new file mode 100644 index 0000000..2d99f13 --- /dev/null +++ b/static/graphs/b3714d59-b61e-4713-903a-9b4f04ae7f3d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Night Dragon" [label="threat-actor\nNight Dragon",shape=octagon,style=filled,color=indianred1];"threat-actor=Night Dragon" -> "mitre-pre-attack-intrusion-set=Night Dragon - G0014" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Night Dragon - G0014" [label="mitre-enterprise-attack-intrusion-set\nNight Dragon - G0014",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Night Dragon - G0014" [label="mitre-pre-attack-intrusion-set\nNight Dragon - G0014",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Night Dragon - G0014" -> "mitre-enterprise-attack-malware=gh0st - S0032" [label="uses",];"mitre-pre-attack-intrusion-set=Night Dragon - G0014" -> "mitre-enterprise-attack-attack-pattern=Valid Accounts - T1078" [label="uses",];"mitre-enterprise-attack-malware=gh0st - S0032" [label="mitre-enterprise-attack-malware\ngh0st - S0032",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=gh0st - S0032" -> "tool=gh0st" [label="similar",dir="both"];"mitre-enterprise-attack-malware=gh0st - S0032" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];"tool=gh0st" [label="tool\ngh0st",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/b3714d59-b61e-4713-903a-9b4f04ae7f3d.png b/static/graphs/b3714d59-b61e-4713-903a-9b4f04ae7f3d.png new file mode 100644 index 0000000..a405408 Binary files /dev/null and b/static/graphs/b3714d59-b61e-4713-903a-9b4f04ae7f3d.png differ diff --git a/static/graphs/b3ea33fd-eaa0-4bab-9bd0-12534c9aa987 b/static/graphs/b3ea33fd-eaa0-4bab-9bd0-12534c9aa987 new file mode 100644 index 0000000..829dd46 --- /dev/null +++ b/static/graphs/b3ea33fd-eaa0-4bab-9bd0-12534c9aa987 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Oficla" [label="tool\nOficla",shape=box,style=filled,color=deepskyblue];"tool=Oficla" -> "botnet=BredoLab" [label="similar",dir="both"];"botnet=BredoLab" [label="botnet\nBredoLab",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/b3ea33fd-eaa0-4bab-9bd0-12534c9aa987.png b/static/graphs/b3ea33fd-eaa0-4bab-9bd0-12534c9aa987.png new file mode 100644 index 0000000..49cdae2 Binary files /dev/null and b/static/graphs/b3ea33fd-eaa0-4bab-9bd0-12534c9aa987.png differ diff --git a/static/graphs/b3f7a454-3b23-4149-99aa-0132323814d0 b/static/graphs/b3f7a454-3b23-4149-99aa-0132323814d0 new file mode 100644 index 0000000..2b9cf74 --- /dev/null +++ b/static/graphs/b3f7a454-3b23-4149-99aa-0132323814d0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=KjW0rm" [label="tool\nKjW0rm",shape=box,style=filled,color=deepskyblue];"tool=KjW0rm" -> "rat=KjW0rm" [label="similar",dir="both"];"rat=KjW0rm" [label="rat\nKjW0rm",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/b3f7a454-3b23-4149-99aa-0132323814d0.png b/static/graphs/b3f7a454-3b23-4149-99aa-0132323814d0.png new file mode 100644 index 0000000..ad057a0 Binary files /dev/null and b/static/graphs/b3f7a454-3b23-4149-99aa-0132323814d0.png differ diff --git a/static/graphs/b42378e0-f147-496f-992a-26a49705395b b/static/graphs/b42378e0-f147-496f-992a-26a49705395b new file mode 100644 index 0000000..e0199cd --- /dev/null +++ b/static/graphs/b42378e0-f147-496f-992a-26a49705395b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "rat=PoisonIvy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "tool=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "tool=poisonivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];} diff --git a/static/graphs/b42378e0-f147-496f-992a-26a49705395b.png b/static/graphs/b42378e0-f147-496f-992a-26a49705395b.png new file mode 100644 index 0000000..6092f77 Binary files /dev/null and b/static/graphs/b42378e0-f147-496f-992a-26a49705395b.png differ diff --git a/static/graphs/b47250ec-2094-4d06-b658-11456e05fe89 b/static/graphs/b47250ec-2094-4d06-b658-11456e05fe89 new file mode 100644 index 0000000..c52c52d --- /dev/null +++ b/static/graphs/b47250ec-2094-4d06-b658-11456e05fe89 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=TeleBots" [label="threat-actor\nTeleBots",shape=octagon,style=filled,color=indianred1];"threat-actor=TeleBots" -> "mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" [label="similar",dir="both"];"threat-actor=TeleBots" -> "threat-actor=Sandworm" [label="similar",dir="both"];"threat-actor=TeleBots" -> "threat-actor=ELECTRUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" [label="mitre-enterprise-attack-intrusion-set\nSandworm Team - G0034",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" -> "mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="uses",];"threat-actor=Sandworm" [label="threat-actor\nSandworm",shape=octagon,style=filled,color=indianred1];"threat-actor=Sandworm" -> "threat-actor=GreyEnergy" [label="similar",dir="both"];"threat-actor=ELECTRUM" [label="threat-actor\nELECTRUM",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="mitre-enterprise-attack-malware\nBlackEnergy - S0089",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "tool=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "malpedia=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];"threat-actor=GreyEnergy" [label="threat-actor\nGreyEnergy",shape=octagon,style=filled,color=indianred1];"tool=BlackEnergy" [label="tool\nBlackEnergy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/b47250ec-2094-4d06-b658-11456e05fe89.png b/static/graphs/b47250ec-2094-4d06-b658-11456e05fe89.png new file mode 100644 index 0000000..4085efd Binary files /dev/null and b/static/graphs/b47250ec-2094-4d06-b658-11456e05fe89.png differ diff --git a/static/graphs/b52d6583-14a2-4ddc-8527-87fd2142558f b/static/graphs/b52d6583-14a2-4ddc-8527-87fd2142558f new file mode 100644 index 0000000..19b423e --- /dev/null +++ b/static/graphs/b52d6583-14a2-4ddc-8527-87fd2142558f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Invoke-PSImage - S0231" [label="mitre-enterprise-attack-tool\nInvoke-PSImage - S0231",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Invoke-PSImage - S0231" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];} diff --git a/static/graphs/b52d6583-14a2-4ddc-8527-87fd2142558f.png b/static/graphs/b52d6583-14a2-4ddc-8527-87fd2142558f.png new file mode 100644 index 0000000..fb83827 Binary files /dev/null and b/static/graphs/b52d6583-14a2-4ddc-8527-87fd2142558f.png differ diff --git a/static/graphs/b52f41b9-ccf6-4da7-a6c0-167eeb71fbd8 b/static/graphs/b52f41b9-ccf6-4da7-a6c0-167eeb71fbd8 new file mode 100644 index 0000000..0560ab5 --- /dev/null +++ b/static/graphs/b52f41b9-ccf6-4da7-a6c0-167eeb71fbd8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Browser Extensions Mitigation - T1176" [label="mitre-enterprise-attack-course-of-action\nBrowser Extensions Mitigation - T1176",shape=ellipse];"mitre-enterprise-attack-course-of-action=Browser Extensions Mitigation - T1176" -> "mitre-enterprise-attack-attack-pattern=Browser Extensions - T1176" [label="mitigates",];} diff --git a/static/graphs/b52f41b9-ccf6-4da7-a6c0-167eeb71fbd8.png b/static/graphs/b52f41b9-ccf6-4da7-a6c0-167eeb71fbd8.png new file mode 100644 index 0000000..e4d17d9 Binary files /dev/null and b/static/graphs/b52f41b9-ccf6-4da7-a6c0-167eeb71fbd8.png differ diff --git a/static/graphs/b533439d-b060-4c90-80e0-9dce67b0c6fb b/static/graphs/b533439d-b060-4c90-80e0-9dce67b0c6fb new file mode 100644 index 0000000..1cc5ccf --- /dev/null +++ b/static/graphs/b533439d-b060-4c90-80e0-9dce67b0c6fb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Sisfader" [label="rat\nSisfader",shape=box,style=filled,color=deepskyblue];"rat=Sisfader" -> "malpedia=Sisfader" [label="similar",dir="both"];} diff --git a/static/graphs/b533439d-b060-4c90-80e0-9dce67b0c6fb.png b/static/graphs/b533439d-b060-4c90-80e0-9dce67b0c6fb.png new file mode 100644 index 0000000..ec444d0 Binary files /dev/null and b/static/graphs/b533439d-b060-4c90-80e0-9dce67b0c6fb.png differ diff --git a/static/graphs/b55c38f8-b369-4f91-904c-b0758927bd99 b/static/graphs/b55c38f8-b369-4f91-904c-b0758927bd99 new file mode 100644 index 0000000..ade6cfd --- /dev/null +++ b/static/graphs/b55c38f8-b369-4f91-904c-b0758927bd99 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-x1881" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];} diff --git a/static/graphs/b55c38f8-b369-4f91-904c-b0758927bd99.png b/static/graphs/b55c38f8-b369-4f91-904c-b0758927bd99.png new file mode 100644 index 0000000..e864bfc Binary files /dev/null and b/static/graphs/b55c38f8-b369-4f91-904c-b0758927bd99.png differ diff --git a/static/graphs/b56af6ab-69f8-457a-bf50-c3aefa6dc14a b/static/graphs/b56af6ab-69f8-457a-bf50-c3aefa6dc14a new file mode 100644 index 0000000..c76a4b4 --- /dev/null +++ b/static/graphs/b56af6ab-69f8-457a-bf50-c3aefa6dc14a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"microsoft-activity-group=DUBNIUM" [label="microsoft-activity-group\nDUBNIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=DUBNIUM" -> "threat-actor=DarkHotel" [label="similar",dir="both"];"threat-actor=DarkHotel" [label="threat-actor\nDarkHotel",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/b56af6ab-69f8-457a-bf50-c3aefa6dc14a.png b/static/graphs/b56af6ab-69f8-457a-bf50-c3aefa6dc14a.png new file mode 100644 index 0000000..387ac18 Binary files /dev/null and b/static/graphs/b56af6ab-69f8-457a-bf50-c3aefa6dc14a.png differ diff --git a/static/graphs/b5be84b7-bf2c-40d0-85a9-14c040881a98 b/static/graphs/b5be84b7-bf2c-40d0-85a9-14c040881a98 new file mode 100644 index 0000000..4b2f959 --- /dev/null +++ b/static/graphs/b5be84b7-bf2c-40d0-85a9-14c040881a98 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=WEBC2" [label="tool\nWEBC2",shape=box,style=filled,color=deepskyblue];"tool=WEBC2" -> "mitre-enterprise-attack-malware=WEBC2 - S0109" [label="similar",dir="both"];"mitre-enterprise-attack-malware=WEBC2 - S0109" [label="mitre-enterprise-attack-malware\nWEBC2 - S0109",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=WEBC2 - S0109" -> "mitre-enterprise-attack-attack-pattern=DLL Search Order Hijacking - T1038" [label="uses",];} diff --git a/static/graphs/b5be84b7-bf2c-40d0-85a9-14c040881a98.png b/static/graphs/b5be84b7-bf2c-40d0-85a9-14c040881a98.png new file mode 100644 index 0000000..f6b329a Binary files /dev/null and b/static/graphs/b5be84b7-bf2c-40d0-85a9-14c040881a98.png differ diff --git a/static/graphs/b6b3dfc7-9a81-43ff-ac04-698bad48973a b/static/graphs/b6b3dfc7-9a81-43ff-ac04-698bad48973a new file mode 100644 index 0000000..9ae9a72 --- /dev/null +++ b/static/graphs/b6b3dfc7-9a81-43ff-ac04-698bad48973a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Daserf - S0187" [label="mitre-enterprise-attack-malware\nDaserf - S0187",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Daserf - S0187" -> "malpedia=Daserf" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Daserf - S0187" -> "mitre-enterprise-attack-attack-pattern=Standard Cryptographic Protocol - T1032" [label="uses",];} diff --git a/static/graphs/b6b3dfc7-9a81-43ff-ac04-698bad48973a.png b/static/graphs/b6b3dfc7-9a81-43ff-ac04-698bad48973a.png new file mode 100644 index 0000000..65f04de Binary files /dev/null and b/static/graphs/b6b3dfc7-9a81-43ff-ac04-698bad48973a.png differ diff --git a/static/graphs/b6d3657a-2d6a-400f-8b7e-4d60391aa1f7 b/static/graphs/b6d3657a-2d6a-400f-8b7e-4d60391aa1f7 new file mode 100644 index 0000000..9db1348 --- /dev/null +++ b/static/graphs/b6d3657a-2d6a-400f-8b7e-4d60391aa1f7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=AndroidOverlayMalware - MOB-S0012" [label="mitre-mobile-attack-malware\nAndroidOverlayMalware - MOB-S0012",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=AndroidOverlayMalware - MOB-S0012" -> "mitre-mobile-attack-attack-pattern=User Interface Spoofing - MOB-T1014" [label="uses",];} diff --git a/static/graphs/b6d3657a-2d6a-400f-8b7e-4d60391aa1f7.png b/static/graphs/b6d3657a-2d6a-400f-8b7e-4d60391aa1f7.png new file mode 100644 index 0000000..55e767e Binary files /dev/null and b/static/graphs/b6d3657a-2d6a-400f-8b7e-4d60391aa1f7.png differ diff --git a/static/graphs/b6ddc2c6-5890-4c60-9b10-4274d1a9cc22 b/static/graphs/b6ddc2c6-5890-4c60-9b10-4274d1a9cc22 new file mode 100644 index 0000000..26536c1 --- /dev/null +++ b/static/graphs/b6ddc2c6-5890-4c60-9b10-4274d1a9cc22 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=GovRAT" [label="rat\nGovRAT",shape=box,style=filled,color=deepskyblue];"rat=GovRAT" -> "malpedia=GovRAT" [label="similar",dir="both"];} diff --git a/static/graphs/b6ddc2c6-5890-4c60-9b10-4274d1a9cc22.png b/static/graphs/b6ddc2c6-5890-4c60-9b10-4274d1a9cc22.png new file mode 100644 index 0000000..677998a Binary files /dev/null and b/static/graphs/b6ddc2c6-5890-4c60-9b10-4274d1a9cc22.png differ diff --git a/static/graphs/b70627f7-3b43-4c6f-8fc0-c918c41f8f72 b/static/graphs/b70627f7-3b43-4c6f-8fc0-c918c41f8f72 new file mode 100644 index 0000000..0fc3933 --- /dev/null +++ b/static/graphs/b70627f7-3b43-4c6f-8fc0-c918c41f8f72 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=DCShadow Mitigation - T1207" [label="mitre-enterprise-attack-course-of-action\nDCShadow Mitigation - T1207",shape=ellipse];"mitre-enterprise-attack-course-of-action=DCShadow Mitigation - T1207" -> "mitre-enterprise-attack-attack-pattern=DCShadow - T1207" [label="mitigates",];} diff --git a/static/graphs/b70627f7-3b43-4c6f-8fc0-c918c41f8f72.png b/static/graphs/b70627f7-3b43-4c6f-8fc0-c918c41f8f72.png new file mode 100644 index 0000000..66915a5 Binary files /dev/null and b/static/graphs/b70627f7-3b43-4c6f-8fc0-c918c41f8f72.png differ diff --git a/static/graphs/b7102922-8aad-4b29-8518-6d87c3ba45bb b/static/graphs/b7102922-8aad-4b29-8518-6d87c3ba45bb new file mode 100644 index 0000000..f461b7e --- /dev/null +++ b/static/graphs/b7102922-8aad-4b29-8518-6d87c3ba45bb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Hermes Ransomware" [label="ransomware\nHermes Ransomware",shape=box,style=filled,color=deepskyblue];"ransomware=Hermes Ransomware" -> "malpedia=Hermes Ransomware" [label="similar",dir="both"];} diff --git a/static/graphs/b7102922-8aad-4b29-8518-6d87c3ba45bb.png b/static/graphs/b7102922-8aad-4b29-8518-6d87c3ba45bb.png new file mode 100644 index 0000000..6009601 Binary files /dev/null and b/static/graphs/b7102922-8aad-4b29-8518-6d87c3ba45bb.png differ diff --git a/static/graphs/b765efd1-02e6-4e67-aebf-0fef5c37e54b b/static/graphs/b765efd1-02e6-4e67-aebf-0fef5c37e54b new file mode 100644 index 0000000..3f8235c --- /dev/null +++ b/static/graphs/b765efd1-02e6-4e67-aebf-0fef5c37e54b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Detect App Analysis Environment - MOB-T1043" [label="mitre-mobile-attack-attack-pattern\nDetect App Analysis Environment - MOB-T1043",shape=ellipse];} diff --git a/static/graphs/b765efd1-02e6-4e67-aebf-0fef5c37e54b.png b/static/graphs/b765efd1-02e6-4e67-aebf-0fef5c37e54b.png new file mode 100644 index 0000000..e93f472 Binary files /dev/null and b/static/graphs/b765efd1-02e6-4e67-aebf-0fef5c37e54b.png differ diff --git a/static/graphs/b76d9845-815c-4e77-9538-6b737269da2f b/static/graphs/b76d9845-815c-4e77-9538-6b737269da2f new file mode 100644 index 0000000..a5c4ee3 --- /dev/null +++ b/static/graphs/b76d9845-815c-4e77-9538-6b737269da2f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Adwind RAT" [label="rat\nAdwind RAT",shape=box,style=filled,color=deepskyblue];"rat=Adwind RAT" -> "tool=Adwind" [label="similar",dir="both"];"rat=Adwind RAT" -> "android=Adwind" [label="similar",dir="both"];"rat=Adwind RAT" -> "android=Sockrat" [label="similar",dir="both"];"rat=Adwind RAT" -> "malpedia=AdWind" [label="similar",dir="both"];"android=Adwind" [label="android\nAdwind",shape=box,style=filled,color=deepskyblue];"android=Sockrat" [label="android\nSockrat",shape=box,style=filled,color=deepskyblue];"tool=Adwind" [label="tool\nAdwind",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/b76d9845-815c-4e77-9538-6b737269da2f.png b/static/graphs/b76d9845-815c-4e77-9538-6b737269da2f.png new file mode 100644 index 0000000..752f5ec Binary files /dev/null and b/static/graphs/b76d9845-815c-4e77-9538-6b737269da2f.png differ diff --git a/static/graphs/b77b563c-34bb-4fb8-86a3-3694338f7b47 b/static/graphs/b77b563c-34bb-4fb8-86a3-3694338f7b47 new file mode 100644 index 0000000..acbc202 --- /dev/null +++ b/static/graphs/b77b563c-34bb-4fb8-86a3-3694338f7b47 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Ping - S0097" [label="mitre-enterprise-attack-tool\nPing - S0097",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Ping - S0097" -> "mitre-enterprise-attack-attack-pattern=Remote System Discovery - T1018" [label="uses",];} diff --git a/static/graphs/b77b563c-34bb-4fb8-86a3-3694338f7b47.png b/static/graphs/b77b563c-34bb-4fb8-86a3-3694338f7b47.png new file mode 100644 index 0000000..2e529e2 Binary files /dev/null and b/static/graphs/b77b563c-34bb-4fb8-86a3-3694338f7b47.png differ diff --git a/static/graphs/b7b2c89c-09c1-4b71-ae7c-000ec2893aab b/static/graphs/b7b2c89c-09c1-4b71-ae7c-000ec2893aab new file mode 100644 index 0000000..c8f569d --- /dev/null +++ b/static/graphs/b7b2c89c-09c1-4b71-ae7c-000ec2893aab @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=New Service Mitigation - T1050" [label="mitre-enterprise-attack-course-of-action\nNew Service Mitigation - T1050",shape=ellipse];"mitre-enterprise-attack-course-of-action=New Service Mitigation - T1050" -> "mitre-enterprise-attack-attack-pattern=New Service - T1050" [label="mitigates",];} diff --git a/static/graphs/b7b2c89c-09c1-4b71-ae7c-000ec2893aab.png b/static/graphs/b7b2c89c-09c1-4b71-ae7c-000ec2893aab.png new file mode 100644 index 0000000..d85b43e Binary files /dev/null and b/static/graphs/b7b2c89c-09c1-4b71-ae7c-000ec2893aab.png differ diff --git a/static/graphs/b7cea5fe-d3fe-47cf-ba82-104c90e130ff b/static/graphs/b7cea5fe-d3fe-47cf-ba82-104c90e130ff new file mode 100644 index 0000000..3082330 --- /dev/null +++ b/static/graphs/b7cea5fe-d3fe-47cf-ba82-104c90e130ff @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=MacSpy" [label="rat\nMacSpy",shape=box,style=filled,color=deepskyblue];"rat=MacSpy" -> "malpedia=MacSpy" [label="similar",dir="both"];} diff --git a/static/graphs/b7cea5fe-d3fe-47cf-ba82-104c90e130ff.png b/static/graphs/b7cea5fe-d3fe-47cf-ba82-104c90e130ff.png new file mode 100644 index 0000000..a094a8d Binary files /dev/null and b/static/graphs/b7cea5fe-d3fe-47cf-ba82-104c90e130ff.png differ diff --git a/static/graphs/b817ce63-f1c3-49de-bd8b-fd56c3f956c9 b/static/graphs/b817ce63-f1c3-49de-bd8b-fd56c3f956c9 new file mode 100644 index 0000000..3a7eb05 --- /dev/null +++ b/static/graphs/b817ce63-f1c3-49de-bd8b-fd56c3f956c9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=TorrentLocker" [label="ransomware\nTorrentLocker",shape=box,style=filled,color=deepskyblue];"ransomware=TorrentLocker" -> "ransomware=CryptoFortress" [label="similar",dir="both"];"ransomware=TorrentLocker" -> "malpedia=CryptoFortress" [label="similar",dir="both"];"ransomware=TorrentLocker" -> "malpedia=TorrentLocker" [label="similar",dir="both"];"ransomware=CryptoFortress" [label="ransomware\nCryptoFortress",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/b817ce63-f1c3-49de-bd8b-fd56c3f956c9.png b/static/graphs/b817ce63-f1c3-49de-bd8b-fd56c3f956c9.png new file mode 100644 index 0000000..ead091d Binary files /dev/null and b/static/graphs/b817ce63-f1c3-49de-bd8b-fd56c3f956c9.png differ diff --git a/static/graphs/b8c8b96d-61e6-47b1-8e38-fd8ad5d9854d b/static/graphs/b8c8b96d-61e6-47b1-8e38-fd8ad5d9854d new file mode 100644 index 0000000..2064c47 --- /dev/null +++ b/static/graphs/b8c8b96d-61e6-47b1-8e38-fd8ad5d9854d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=DarkHotel" [label="threat-actor\nDarkHotel",shape=octagon,style=filled,color=indianred1];"threat-actor=DarkHotel" -> "microsoft-activity-group=DUBNIUM" [label="similar",dir="both"];"microsoft-activity-group=DUBNIUM" [label="microsoft-activity-group\nDUBNIUM",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/b8c8b96d-61e6-47b1-8e38-fd8ad5d9854d.png b/static/graphs/b8c8b96d-61e6-47b1-8e38-fd8ad5d9854d.png new file mode 100644 index 0000000..186978e Binary files /dev/null and b/static/graphs/b8c8b96d-61e6-47b1-8e38-fd8ad5d9854d.png differ diff --git a/static/graphs/b8d57b16-d8e2-428c-a645-1083795b3445 b/static/graphs/b8d57b16-d8e2-428c-a645-1083795b3445 new file mode 100644 index 0000000..c7d9cd0 --- /dev/null +++ b/static/graphs/b8d57b16-d8e2-428c-a645-1083795b3445 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Communication Through Removable Media Mitigation - T1092" [label="mitre-enterprise-attack-course-of-action\nCommunication Through Removable Media Mitigation - T1092",shape=ellipse];"mitre-enterprise-attack-course-of-action=Communication Through Removable Media Mitigation - T1092" -> "mitre-enterprise-attack-attack-pattern=Communication Through Removable Media - T1092" [label="mitigates",];} diff --git a/static/graphs/b8d57b16-d8e2-428c-a645-1083795b3445.png b/static/graphs/b8d57b16-d8e2-428c-a645-1083795b3445.png new file mode 100644 index 0000000..c2bda8e Binary files /dev/null and b/static/graphs/b8d57b16-d8e2-428c-a645-1083795b3445.png differ diff --git a/static/graphs/b8eb28e4-48a6-40ae-951a-328714f75eda b/static/graphs/b8eb28e4-48a6-40ae-951a-328714f75eda new file mode 100644 index 0000000..4c74b5e --- /dev/null +++ b/static/graphs/b8eb28e4-48a6-40ae-951a-328714f75eda @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=BISCUIT - S0017" [label="mitre-enterprise-attack-malware\nBISCUIT - S0017",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BISCUIT - S0017" -> "tool=BISCUIT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BISCUIT - S0017" -> "mitre-enterprise-attack-attack-pattern=Fallback Channels - T1008" [label="uses",];"tool=BISCUIT" [label="tool\nBISCUIT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/b8eb28e4-48a6-40ae-951a-328714f75eda.png b/static/graphs/b8eb28e4-48a6-40ae-951a-328714f75eda.png new file mode 100644 index 0000000..494f5e0 Binary files /dev/null and b/static/graphs/b8eb28e4-48a6-40ae-951a-328714f75eda.png differ diff --git a/static/graphs/b91c2f9e-c1a0-44df-95f0-9e7c9d1d5e55 b/static/graphs/b91c2f9e-c1a0-44df-95f0-9e7c9d1d5e55 new file mode 100644 index 0000000..0241458 --- /dev/null +++ b/static/graphs/b91c2f9e-c1a0-44df-95f0-9e7c9d1d5e55 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=SID-History Injection Mitigation - T1178" [label="mitre-enterprise-attack-course-of-action\nSID-History Injection Mitigation - T1178",shape=ellipse];"mitre-enterprise-attack-course-of-action=SID-History Injection Mitigation - T1178" -> "mitre-enterprise-attack-attack-pattern=SID-History Injection - T1178" [label="mitigates",];} diff --git a/static/graphs/b91c2f9e-c1a0-44df-95f0-9e7c9d1d5e55.png b/static/graphs/b91c2f9e-c1a0-44df-95f0-9e7c9d1d5e55.png new file mode 100644 index 0000000..9ef891e Binary files /dev/null and b/static/graphs/b91c2f9e-c1a0-44df-95f0-9e7c9d1d5e55.png differ diff --git a/static/graphs/b928b94a-4966-4e2a-9e61-36505b896ebc b/static/graphs/b928b94a-4966-4e2a-9e61-36505b896ebc new file mode 100644 index 0000000..bfc3ece --- /dev/null +++ b/static/graphs/b928b94a-4966-4e2a-9e61-36505b896ebc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Malicious Software Development Tools - MOB-T1065" [label="mitre-mobile-attack-attack-pattern\nMalicious Software Development Tools - MOB-T1065",shape=ellipse];} diff --git a/static/graphs/b928b94a-4966-4e2a-9e61-36505b896ebc.png b/static/graphs/b928b94a-4966-4e2a-9e61-36505b896ebc.png new file mode 100644 index 0000000..c16f9e9 Binary files /dev/null and b/static/graphs/b928b94a-4966-4e2a-9e61-36505b896ebc.png differ diff --git a/static/graphs/b9448d2a-a23c-4bf2-92a1-d860716ba2f3 b/static/graphs/b9448d2a-a23c-4bf2-92a1-d860716ba2f3 new file mode 100644 index 0000000..779f886 --- /dev/null +++ b/static/graphs/b9448d2a-a23c-4bf2-92a1-d860716ba2f3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Gozi" [label="banker\nGozi",shape=box,style=filled,color=deepskyblue];"banker=Gozi" -> "tool=Snifula" [label="similar",dir="both"];"banker=Gozi" -> "malpedia=Gozi" [label="similar",dir="both"];"banker=Gozi" -> "malpedia=Snifula" [label="similar",dir="both"];"tool=Snifula" [label="tool\nSnifula",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/b9448d2a-a23c-4bf2-92a1-d860716ba2f3.png b/static/graphs/b9448d2a-a23c-4bf2-92a1-d860716ba2f3.png new file mode 100644 index 0000000..bc45c55 Binary files /dev/null and b/static/graphs/b9448d2a-a23c-4bf2-92a1-d860716ba2f3.png differ diff --git a/static/graphs/b95aa3fb-9f32-450e-8058-67d94f196913 b/static/graphs/b95aa3fb-9f32-450e-8058-67d94f196913 new file mode 100644 index 0000000..93d9214 --- /dev/null +++ b/static/graphs/b95aa3fb-9f32-450e-8058-67d94f196913 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=MM Locker" [label="ransomware\nMM Locker",shape=box,style=filled,color=deepskyblue];"ransomware=MM Locker" -> "ransomware=Booyah" [label="similar",dir="both"];"ransomware=Booyah" [label="ransomware\nBooyah",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/b95aa3fb-9f32-450e-8058-67d94f196913.png b/static/graphs/b95aa3fb-9f32-450e-8058-67d94f196913.png new file mode 100644 index 0000000..dd58e1c Binary files /dev/null and b/static/graphs/b95aa3fb-9f32-450e-8058-67d94f196913.png differ diff --git a/static/graphs/b96680d1-5eb3-4f07-b95c-00ab904ac236 b/static/graphs/b96680d1-5eb3-4f07-b95c-00ab904ac236 new file mode 100644 index 0000000..a587f18 --- /dev/null +++ b/static/graphs/b96680d1-5eb3-4f07-b95c-00ab904ac236 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Pisloader - S0124" [label="mitre-enterprise-attack-malware\nPisloader - S0124",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Pisloader - S0124" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];} diff --git a/static/graphs/b96680d1-5eb3-4f07-b95c-00ab904ac236.png b/static/graphs/b96680d1-5eb3-4f07-b95c-00ab904ac236.png new file mode 100644 index 0000000..8d7cd3d Binary files /dev/null and b/static/graphs/b96680d1-5eb3-4f07-b95c-00ab904ac236.png differ diff --git a/static/graphs/b9707a57-d15f-4937-b022-52cc17f6783f b/static/graphs/b9707a57-d15f-4937-b022-52cc17f6783f new file mode 100644 index 0000000..85b16a7 --- /dev/null +++ b/static/graphs/b9707a57-d15f-4937-b022-52cc17f6783f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=IsSpace" [label="tool\nIsSpace",shape=box,style=filled,color=deepskyblue];"tool=IsSpace" -> "malpedia=IsSpace" [label="similar",dir="both"];} diff --git a/static/graphs/b9707a57-d15f-4937-b022-52cc17f6783f.png b/static/graphs/b9707a57-d15f-4937-b022-52cc17f6783f.png new file mode 100644 index 0000000..9aeb653 Binary files /dev/null and b/static/graphs/b9707a57-d15f-4937-b022-52cc17f6783f.png differ diff --git a/static/graphs/b9963d52-a391-4e9c-92e7-d2a147d5451f b/static/graphs/b9963d52-a391-4e9c-92e7-d2a147d5451f new file mode 100644 index 0000000..7ec0dee --- /dev/null +++ b/static/graphs/b9963d52-a391-4e9c-92e7-d2a147d5451f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Shujin" [label="ransomware\nShujin",shape=box,style=filled,color=deepskyblue];"ransomware=Shujin" -> "malpedia=Shujin" [label="similar",dir="both"];} diff --git a/static/graphs/b9963d52-a391-4e9c-92e7-d2a147d5451f.png b/static/graphs/b9963d52-a391-4e9c-92e7-d2a147d5451f.png new file mode 100644 index 0000000..33a0dd6 Binary files /dev/null and b/static/graphs/b9963d52-a391-4e9c-92e7-d2a147d5451f.png differ diff --git a/static/graphs/b9f00c61-6cd1-4112-a632-c8d3837a7ddd b/static/graphs/b9f00c61-6cd1-4112-a632-c8d3837a7ddd new file mode 100644 index 0000000..9431258 --- /dev/null +++ b/static/graphs/b9f00c61-6cd1-4112-a632-c8d3837a7ddd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Gamarue" [label="tool\nGamarue",shape=box,style=filled,color=deepskyblue];"tool=Gamarue" -> "malpedia=Andromeda" [label="similar",dir="both"];} diff --git a/static/graphs/b9f00c61-6cd1-4112-a632-c8d3837a7ddd.png b/static/graphs/b9f00c61-6cd1-4112-a632-c8d3837a7ddd.png new file mode 100644 index 0000000..ef63cf5 Binary files /dev/null and b/static/graphs/b9f00c61-6cd1-4112-a632-c8d3837a7ddd.png differ diff --git a/static/graphs/ba06d68a-4891-4eb5-b634-152e05ec60ee b/static/graphs/ba06d68a-4891-4eb5-b634-152e05ec60ee new file mode 100644 index 0000000..27410f4 --- /dev/null +++ b/static/graphs/ba06d68a-4891-4eb5-b634-152e05ec60ee @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Data Transfer Size Limits Mitigation - T1030" [label="mitre-enterprise-attack-course-of-action\nData Transfer Size Limits Mitigation - T1030",shape=ellipse];"mitre-enterprise-attack-course-of-action=Data Transfer Size Limits Mitigation - T1030" -> "mitre-enterprise-attack-attack-pattern=Data Transfer Size Limits - T1030" [label="mitigates",];} diff --git a/static/graphs/ba06d68a-4891-4eb5-b634-152e05ec60ee.png b/static/graphs/ba06d68a-4891-4eb5-b634-152e05ec60ee.png new file mode 100644 index 0000000..cf54427 Binary files /dev/null and b/static/graphs/ba06d68a-4891-4eb5-b634-152e05ec60ee.png differ diff --git a/static/graphs/ba2ec548-fb75-4b8c-88d6-d91a77a943cf b/static/graphs/ba2ec548-fb75-4b8c-88d6-d91a77a943cf new file mode 100644 index 0000000..f01e6b7 --- /dev/null +++ b/static/graphs/ba2ec548-fb75-4b8c-88d6-d91a77a943cf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Windows Management Instrumentation Mitigation - T1047" [label="mitre-enterprise-attack-course-of-action\nWindows Management Instrumentation Mitigation - T1047",shape=ellipse];"mitre-enterprise-attack-course-of-action=Windows Management Instrumentation Mitigation - T1047" -> "mitre-enterprise-attack-attack-pattern=Windows Management Instrumentation - T1047" [label="mitigates",];} diff --git a/static/graphs/ba2ec548-fb75-4b8c-88d6-d91a77a943cf.png b/static/graphs/ba2ec548-fb75-4b8c-88d6-d91a77a943cf.png new file mode 100644 index 0000000..a7b43c7 Binary files /dev/null and b/static/graphs/ba2ec548-fb75-4b8c-88d6-d91a77a943cf.png differ diff --git a/static/graphs/ba724df5-9aa0-45ca-8e0e-7101c208ae48 b/static/graphs/ba724df5-9aa0-45ca-8e0e-7101c208ae48 new file mode 100644 index 0000000..c86b9eb --- /dev/null +++ b/static/graphs/ba724df5-9aa0-45ca-8e0e-7101c208ae48 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Flying Kitten" -> "threat-actor=Rocket Kitten" [label="similar",dir="both"];"threat-actor=Flying Kitten" -> "mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="similar",dir="both"];"threat-actor=Flying Kitten" -> "threat-actor=Charming Kitten" [label="similar",dir="both"];"threat-actor=Flying Kitten" -> "threat-actor=Cleaver" [label="similar",dir="both"];"threat-actor=Flying Kitten" -> "threat-actor=OilRig" [label="similar",dir="both"];"threat-actor=Flying Kitten" -> "threat-actor=Clever Kitten" [label="similar",dir="both"];"threat-actor=Flying Kitten" -> "threat-actor=CHRYSENE" [label="similar",dir="both"];"threat-actor=Flying Kitten" -> "mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Cutting Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="similar",dir="both"];"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "threat-actor=Greenbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ba724df5-9aa0-45ca-8e0e-7101c208ae48.png b/static/graphs/ba724df5-9aa0-45ca-8e0e-7101c208ae48.png new file mode 100644 index 0000000..5132d0e Binary files /dev/null and b/static/graphs/ba724df5-9aa0-45ca-8e0e-7101c208ae48.png differ diff --git a/static/graphs/bae9e253-9515-4f1f-b34f-e8fc6747c2e0 b/static/graphs/bae9e253-9515-4f1f-b34f-e8fc6747c2e0 new file mode 100644 index 0000000..b3f0a5b --- /dev/null +++ b/static/graphs/bae9e253-9515-4f1f-b34f-e8fc6747c2e0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Abusive Content:Spam" [label="rsit\nAbusive Content:Spam",shape=ellipse];} diff --git a/static/graphs/bae9e253-9515-4f1f-b34f-e8fc6747c2e0.png b/static/graphs/bae9e253-9515-4f1f-b34f-e8fc6747c2e0.png new file mode 100644 index 0000000..2264455 Binary files /dev/null and b/static/graphs/bae9e253-9515-4f1f-b34f-e8fc6747c2e0.png differ diff --git a/static/graphs/bb3c1098-d654-4620-bf40-694386d28921 b/static/graphs/bb3c1098-d654-4620-bf40-694386d28921 new file mode 100644 index 0000000..26cc02e --- /dev/null +++ b/static/graphs/bb3c1098-d654-4620-bf40-694386d28921 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=FakeM - S0076" [label="mitre-enterprise-attack-malware\nFakeM - S0076",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=FakeM - S0076" -> "mitre-enterprise-attack-attack-pattern=Custom Cryptographic Protocol - T1024" [label="uses",];} diff --git a/static/graphs/bb3c1098-d654-4620-bf40-694386d28921.png b/static/graphs/bb3c1098-d654-4620-bf40-694386d28921.png new file mode 100644 index 0000000..4e3a2d5 Binary files /dev/null and b/static/graphs/bb3c1098-d654-4620-bf40-694386d28921.png differ diff --git a/static/graphs/bb6492fa-36b5-4f4a-a787-e718e7f9997f b/static/graphs/bb6492fa-36b5-4f4a-a787-e718e7f9997f new file mode 100644 index 0000000..3ccf99b --- /dev/null +++ b/static/graphs/bb6492fa-36b5-4f4a-a787-e718e7f9997f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=SLUB Backdoor" [label="tool\nSLUB Backdoor",shape=box,style=filled,color=deepskyblue];"tool=SLUB Backdoor" -> "backdoor=SLUB" [label="similar",dir="both"];"backdoor=SLUB" [label="backdoor\nSLUB",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/bb6492fa-36b5-4f4a-a787-e718e7f9997f.png b/static/graphs/bb6492fa-36b5-4f4a-a787-e718e7f9997f.png new file mode 100644 index 0000000..bcfe1bf Binary files /dev/null and b/static/graphs/bb6492fa-36b5-4f4a-a787-e718e7f9997f.png differ diff --git a/static/graphs/bba595da-b73a-4354-aa6c-224d4de7cb4e b/static/graphs/bba595da-b73a-4354-aa6c-224d4de7cb4e new file mode 100644 index 0000000..dc127d7 --- /dev/null +++ b/static/graphs/bba595da-b73a-4354-aa6c-224d4de7cb4e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=cmd - S0106" [label="mitre-enterprise-attack-tool\ncmd - S0106",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=cmd - S0106" -> "mitre-enterprise-attack-attack-pattern=File Deletion - T1107" [label="uses",];} diff --git a/static/graphs/bba595da-b73a-4354-aa6c-224d4de7cb4e.png b/static/graphs/bba595da-b73a-4354-aa6c-224d4de7cb4e.png new file mode 100644 index 0000000..30fb2ad Binary files /dev/null and b/static/graphs/bba595da-b73a-4354-aa6c-224d4de7cb4e.png differ diff --git a/static/graphs/bc0be3a4-89d8-4c4c-b2aa-2dddbed1f71d b/static/graphs/bc0be3a4-89d8-4c4c-b2aa-2dddbed1f71d new file mode 100644 index 0000000..1659540 --- /dev/null +++ b/static/graphs/bc0be3a4-89d8-4c4c-b2aa-2dddbed1f71d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Zeus KINS" [label="banker\nZeus KINS",shape=box,style=filled,color=deepskyblue];"banker=Zeus KINS" -> "malpedia=KINS" [label="similar",dir="both"];} diff --git a/static/graphs/bc0be3a4-89d8-4c4c-b2aa-2dddbed1f71d.png b/static/graphs/bc0be3a4-89d8-4c4c-b2aa-2dddbed1f71d.png new file mode 100644 index 0000000..5d5fdae Binary files /dev/null and b/static/graphs/bc0be3a4-89d8-4c4c-b2aa-2dddbed1f71d.png differ diff --git a/static/graphs/bcc91b8c-f104-4710-964e-1d5409666736 b/static/graphs/bcc91b8c-f104-4710-964e-1d5409666736 new file mode 100644 index 0000000..a71ee70 --- /dev/null +++ b/static/graphs/bcc91b8c-f104-4710-964e-1d5409666736 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Web Shell Mitigation - T1100" [label="mitre-enterprise-attack-course-of-action\nWeb Shell Mitigation - T1100",shape=ellipse];"mitre-enterprise-attack-course-of-action=Web Shell Mitigation - T1100" -> "mitre-enterprise-attack-attack-pattern=Web Shell - T1100" [label="mitigates",];} diff --git a/static/graphs/bcc91b8c-f104-4710-964e-1d5409666736.png b/static/graphs/bcc91b8c-f104-4710-964e-1d5409666736.png new file mode 100644 index 0000000..53f5db4 Binary files /dev/null and b/static/graphs/bcc91b8c-f104-4710-964e-1d5409666736.png differ diff --git a/static/graphs/bcecd036-f40e-4916-9f8e-fd0ccf0ece8d b/static/graphs/bcecd036-f40e-4916-9f8e-fd0ccf0ece8d new file mode 100644 index 0000000..ce5521a --- /dev/null +++ b/static/graphs/bcecd036-f40e-4916-9f8e-fd0ccf0ece8d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=Security Updates - MOB-M1001" [label="mitre-mobile-attack-course-of-action\nSecurity Updates - MOB-M1001",shape=ellipse];"mitre-mobile-attack-course-of-action=Security Updates - MOB-M1001" -> "mitre-mobile-attack-attack-pattern=Device Unlock Code Guessing or Brute Force - MOB-T1062" [label="mitigates",];"mitre-mobile-attack-course-of-action=Security Updates - MOB-M1001" -> "mitre-mobile-attack-attack-pattern=Network Traffic Capture or Redirection - MOB-T1013" [label="mitigates",];"mitre-mobile-attack-attack-pattern=Device Unlock Code Guessing or Brute Force - MOB-T1062" [label="mitre-mobile-attack-attack-pattern\nDevice Unlock Code Guessing or Brute Force - MOB-T1062",shape=ellipse];"mitre-mobile-attack-attack-pattern=Device Unlock Code Guessing or Brute Force - MOB-T1062" -> "mitre-mobile-attack-attack-pattern=Lockscreen Bypass - MOB-T1064" [label="revoked-by",];} diff --git a/static/graphs/bcecd036-f40e-4916-9f8e-fd0ccf0ece8d.png b/static/graphs/bcecd036-f40e-4916-9f8e-fd0ccf0ece8d.png new file mode 100644 index 0000000..8849d82 Binary files /dev/null and b/static/graphs/bcecd036-f40e-4916-9f8e-fd0ccf0ece8d.png differ diff --git a/static/graphs/bcee7b05-89a6-41a5-b7aa-fce4da7ede9e b/static/graphs/bcee7b05-89a6-41a5-b7aa-fce4da7ede9e new file mode 100644 index 0000000..efa5f9a --- /dev/null +++ b/static/graphs/bcee7b05-89a6-41a5-b7aa-fce4da7ede9e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Pass the Hash Mitigation - T1075" [label="mitre-enterprise-attack-course-of-action\nPass the Hash Mitigation - T1075",shape=ellipse];"mitre-enterprise-attack-course-of-action=Pass the Hash Mitigation - T1075" -> "mitre-enterprise-attack-attack-pattern=Pass the Hash - T1075" [label="mitigates",];} diff --git a/static/graphs/bcee7b05-89a6-41a5-b7aa-fce4da7ede9e.png b/static/graphs/bcee7b05-89a6-41a5-b7aa-fce4da7ede9e.png new file mode 100644 index 0000000..a95e45b Binary files /dev/null and b/static/graphs/bcee7b05-89a6-41a5-b7aa-fce4da7ede9e.png differ diff --git a/static/graphs/bd2554b8-634f-4434-a986-9b49c29da2ae b/static/graphs/bd2554b8-634f-4434-a986-9b49c29da2ae new file mode 100644 index 0000000..925d5ca --- /dev/null +++ b/static/graphs/bd2554b8-634f-4434-a986-9b49c29da2ae @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Security Software Discovery Mitigation - T1063" [label="mitre-enterprise-attack-course-of-action\nSecurity Software Discovery Mitigation - T1063",shape=ellipse];"mitre-enterprise-attack-course-of-action=Security Software Discovery Mitigation - T1063" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="mitigates",];} diff --git a/static/graphs/bd2554b8-634f-4434-a986-9b49c29da2ae.png b/static/graphs/bd2554b8-634f-4434-a986-9b49c29da2ae.png new file mode 100644 index 0000000..66aa37e Binary files /dev/null and b/static/graphs/bd2554b8-634f-4434-a986-9b49c29da2ae.png differ diff --git a/static/graphs/bd4bfbab-c21d-4971-b70c-b180bcf40630 b/static/graphs/bd4bfbab-c21d-4971-b70c-b180bcf40630 new file mode 100644 index 0000000..eb4d482 --- /dev/null +++ b/static/graphs/bd4bfbab-c21d-4971-b70c-b180bcf40630 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Serpico" [label="ransomware\nSerpico",shape=box,style=filled,color=deepskyblue];"ransomware=Serpico" -> "malpedia=Serpico" [label="similar",dir="both"];} diff --git a/static/graphs/bd4bfbab-c21d-4971-b70c-b180bcf40630.png b/static/graphs/bd4bfbab-c21d-4971-b70c-b180bcf40630.png new file mode 100644 index 0000000..076bc3e Binary files /dev/null and b/static/graphs/bd4bfbab-c21d-4971-b70c-b180bcf40630.png differ diff --git a/static/graphs/bdb420be-5882-41c8-b439-02bbef69d83f b/static/graphs/bdb420be-5882-41c8-b439-02bbef69d83f new file mode 100644 index 0000000..2732085 --- /dev/null +++ b/static/graphs/bdb420be-5882-41c8-b439-02bbef69d83f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Pupy" [label="rat\nPupy",shape=box,style=filled,color=deepskyblue];"rat=Pupy" -> "mitre-enterprise-attack-tool=Pupy - S0192" [label="similar",dir="both"];"mitre-enterprise-attack-tool=Pupy - S0192" [label="mitre-enterprise-attack-tool\nPupy - S0192",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Pupy - S0192" -> "mitre-enterprise-attack-attack-pattern=Scripting - T1064" [label="uses",];} diff --git a/static/graphs/bdb420be-5882-41c8-b439-02bbef69d83f.png b/static/graphs/bdb420be-5882-41c8-b439-02bbef69d83f.png new file mode 100644 index 0000000..5958395 Binary files /dev/null and b/static/graphs/bdb420be-5882-41c8-b439-02bbef69d83f.png differ diff --git a/static/graphs/be419332-61ab-45f0-979e-56f78a223c8e b/static/graphs/be419332-61ab-45f0-979e-56f78a223c8e new file mode 100644 index 0000000..32f211f --- /dev/null +++ b/static/graphs/be419332-61ab-45f0-979e-56f78a223c8e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=metasploit" [label="tool\nmetasploit",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/be419332-61ab-45f0-979e-56f78a223c8e.png b/static/graphs/be419332-61ab-45f0-979e-56f78a223c8e.png new file mode 100644 index 0000000..2d8724d Binary files /dev/null and b/static/graphs/be419332-61ab-45f0-979e-56f78a223c8e.png differ diff --git a/static/graphs/beb45abb-11e8-4aef-9778-1f9ac249784f b/static/graphs/beb45abb-11e8-4aef-9778-1f9ac249784f new file mode 100644 index 0000000..794c704 --- /dev/null +++ b/static/graphs/beb45abb-11e8-4aef-9778-1f9ac249784f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Bypass User Account Control Mitigation - T1088" [label="mitre-enterprise-attack-course-of-action\nBypass User Account Control Mitigation - T1088",shape=ellipse];"mitre-enterprise-attack-course-of-action=Bypass User Account Control Mitigation - T1088" -> "mitre-enterprise-attack-attack-pattern=Bypass User Account Control - T1088" [label="mitigates",];} diff --git a/static/graphs/beb45abb-11e8-4aef-9778-1f9ac249784f.png b/static/graphs/beb45abb-11e8-4aef-9778-1f9ac249784f.png new file mode 100644 index 0000000..9fcbb2c Binary files /dev/null and b/static/graphs/beb45abb-11e8-4aef-9778-1f9ac249784f.png differ diff --git a/static/graphs/becf81e5-f989-4093-a67d-d55a0483885f b/static/graphs/becf81e5-f989-4093-a67d-d55a0483885f new file mode 100644 index 0000000..a6abf6c --- /dev/null +++ b/static/graphs/becf81e5-f989-4093-a67d-d55a0483885f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=CORALDECK" [label="tool\nCORALDECK",shape=box,style=filled,color=deepskyblue];"tool=CORALDECK" -> "mitre-enterprise-attack-malware=CORALDECK - S0212" [label="similar",dir="both"];"mitre-enterprise-attack-malware=CORALDECK - S0212" [label="mitre-enterprise-attack-malware\nCORALDECK - S0212",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CORALDECK - S0212" -> "mitre-enterprise-attack-attack-pattern=Data Compressed - T1002" [label="uses",];} diff --git a/static/graphs/becf81e5-f989-4093-a67d-d55a0483885f.png b/static/graphs/becf81e5-f989-4093-a67d-d55a0483885f.png new file mode 100644 index 0000000..dfeedb5 Binary files /dev/null and b/static/graphs/becf81e5-f989-4093-a67d-d55a0483885f.png differ diff --git a/static/graphs/bef4187f-1176-4551-83d8-8a1ba9987379 b/static/graphs/bef4187f-1176-4551-83d8-8a1ba9987379 new file mode 100644 index 0000000..25b66e5 --- /dev/null +++ b/static/graphs/bef4187f-1176-4551-83d8-8a1ba9987379 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Availability:Distributed Denial of Service" [label="rsit\nAvailability:Distributed Denial of Service",shape=ellipse];} diff --git a/static/graphs/bef4187f-1176-4551-83d8-8a1ba9987379.png b/static/graphs/bef4187f-1176-4551-83d8-8a1ba9987379.png new file mode 100644 index 0000000..9665cc5 Binary files /dev/null and b/static/graphs/bef4187f-1176-4551-83d8-8a1ba9987379.png differ diff --git a/static/graphs/bef4c620-0787-42a8-a96d-b7eb6e85917c b/static/graphs/bef4c620-0787-42a8-a96d-b7eb6e85917c new file mode 100644 index 0000000..52ef545 --- /dev/null +++ b/static/graphs/bef4c620-0787-42a8-a96d-b7eb6e85917c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=APT28 - G0007" [label="mitre-enterprise-attack-intrusion-set\nAPT28 - G0007",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT28 - G0007" -> "microsoft-activity-group=STRONTIUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT28 - G0007" -> "threat-actor=Sofacy" [label="similar",dir="both"];"mitre-mobile-attack-intrusion-set=APT28 - G0007" [label="mitre-mobile-attack-intrusion-set\nAPT28 - G0007",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT28 - G0007" [label="mitre-pre-attack-intrusion-set\nAPT28 - G0007",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT28 - G0007" -> "mitre-enterprise-attack-attack-pattern=Rundll32 - T1085" [label="uses",];"mitre-pre-attack-intrusion-set=APT28 - G0007" -> "mitre-enterprise-attack-attack-pattern=Spearphishing Attachment - T1193" [label="uses",];"microsoft-activity-group=STRONTIUM" [label="microsoft-activity-group\nSTRONTIUM",shape=octagon,style=filled,color=indianred1];"threat-actor=Sofacy" [label="threat-actor\nSofacy",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/bef4c620-0787-42a8-a96d-b7eb6e85917c.png b/static/graphs/bef4c620-0787-42a8-a96d-b7eb6e85917c.png new file mode 100644 index 0000000..2af1312 Binary files /dev/null and b/static/graphs/bef4c620-0787-42a8-a96d-b7eb6e85917c.png differ diff --git a/static/graphs/c0091a62-b1cd-495d-898b-d2f3b5af601e b/static/graphs/c0091a62-b1cd-495d-898b-d2f3b5af601e new file mode 100644 index 0000000..41473ed --- /dev/null +++ b/static/graphs/c0091a62-b1cd-495d-898b-d2f3b5af601e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Hades" [label="ransomware\nHades",shape=box,style=filled,color=deepskyblue];"ransomware=Hades" -> "ransomware=WildFire Locker" [label="similar",dir="both"];"ransomware=WildFire Locker" [label="ransomware\nWildFire Locker",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c0091a62-b1cd-495d-898b-d2f3b5af601e.png b/static/graphs/c0091a62-b1cd-495d-898b-d2f3b5af601e.png new file mode 100644 index 0000000..38f0747 Binary files /dev/null and b/static/graphs/c0091a62-b1cd-495d-898b-d2f3b5af601e.png differ diff --git a/static/graphs/c01ef312-dfd6-403f-a8b5-67fc11a550a7 b/static/graphs/c01ef312-dfd6-403f-a8b5-67fc11a550a7 new file mode 100644 index 0000000..384a4cd --- /dev/null +++ b/static/graphs/c01ef312-dfd6-403f-a8b5-67fc11a550a7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Kiler RAT" [label="rat\nKiler RAT",shape=box,style=filled,color=deepskyblue];"rat=Kiler RAT" -> "rat=NJRat" [label="similar",dir="both"];"rat=NJRat" [label="rat\nNJRat",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c01ef312-dfd6-403f-a8b5-67fc11a550a7.png b/static/graphs/c01ef312-dfd6-403f-a8b5-67fc11a550a7.png new file mode 100644 index 0000000..188feb7 Binary files /dev/null and b/static/graphs/c01ef312-dfd6-403f-a8b5-67fc11a550a7.png differ diff --git a/static/graphs/c085476e-1964-4d7f-86e1-d8657a7741e8 b/static/graphs/c085476e-1964-4d7f-86e1-d8657a7741e8 new file mode 100644 index 0000000..3d8ed39 --- /dev/null +++ b/static/graphs/c085476e-1964-4d7f-86e1-d8657a7741e8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Accessibility Features Mitigation - T1015" [label="mitre-enterprise-attack-course-of-action\nAccessibility Features Mitigation - T1015",shape=ellipse];"mitre-enterprise-attack-course-of-action=Accessibility Features Mitigation - T1015" -> "mitre-enterprise-attack-attack-pattern=Accessibility Features - T1015" [label="mitigates",];} diff --git a/static/graphs/c085476e-1964-4d7f-86e1-d8657a7741e8.png b/static/graphs/c085476e-1964-4d7f-86e1-d8657a7741e8.png new file mode 100644 index 0000000..46aadf1 Binary files /dev/null and b/static/graphs/c085476e-1964-4d7f-86e1-d8657a7741e8.png differ diff --git a/static/graphs/c097471c-2405-4393-b6d7-afbcb5f0cd11 b/static/graphs/c097471c-2405-4393-b6d7-afbcb5f0cd11 new file mode 100644 index 0000000..44ddaa8 --- /dev/null +++ b/static/graphs/c097471c-2405-4393-b6d7-afbcb5f0cd11 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=APT 26" [label="threat-actor\nAPT 26",shape=octagon,style=filled,color=indianred1];"threat-actor=APT 26" -> "mitre-enterprise-attack-intrusion-set=Turla - G0010" [label="similar",dir="both"];"threat-actor=APT 26" -> "threat-actor=Turla Group" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Turla - G0010" [label="mitre-enterprise-attack-intrusion-set\nTurla - G0010",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Turla - G0010" -> "mitre-enterprise-attack-malware=Epic - S0091" [label="uses",];"threat-actor=Turla Group" [label="threat-actor\nTurla Group",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=Epic - S0091" [label="mitre-enterprise-attack-malware\nEpic - S0091",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Epic - S0091" -> "tool=Wipbot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Epic - S0091" -> "malpedia=Wipbot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Epic - S0091" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=Wipbot" [label="tool\nWipbot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c097471c-2405-4393-b6d7-afbcb5f0cd11.png b/static/graphs/c097471c-2405-4393-b6d7-afbcb5f0cd11.png new file mode 100644 index 0000000..b3f6145 Binary files /dev/null and b/static/graphs/c097471c-2405-4393-b6d7-afbcb5f0cd11.png differ diff --git a/static/graphs/c0c45d38-fe57-4cd4-b2b2-9ecd0ddd4ca9 b/static/graphs/c0c45d38-fe57-4cd4-b2b2-9ecd0ddd4ca9 new file mode 100644 index 0000000..5e126fe --- /dev/null +++ b/static/graphs/c0c45d38-fe57-4cd4-b2b2-9ecd0ddd4ca9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c0c45d38-fe57-4cd4-b2b2-9ecd0ddd4ca9.png b/static/graphs/c0c45d38-fe57-4cd4-b2b2-9ecd0ddd4ca9.png new file mode 100644 index 0000000..5fb7612 Binary files /dev/null and b/static/graphs/c0c45d38-fe57-4cd4-b2b2-9ecd0ddd4ca9.png differ diff --git a/static/graphs/c0ea7b89-d246-4eb7-8de4-b4e17e135051 b/static/graphs/c0ea7b89-d246-4eb7-8de4-b4e17e135051 new file mode 100644 index 0000000..f4f968f --- /dev/null +++ b/static/graphs/c0ea7b89-d246-4eb7-8de4-b4e17e135051 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Elirks" [label="tool\nElirks",shape=box,style=filled,color=deepskyblue];"tool=Elirks" -> "malpedia=Elirks" [label="similar",dir="both"];} diff --git a/static/graphs/c0ea7b89-d246-4eb7-8de4-b4e17e135051.png b/static/graphs/c0ea7b89-d246-4eb7-8de4-b4e17e135051.png new file mode 100644 index 0000000..f27382b Binary files /dev/null and b/static/graphs/c0ea7b89-d246-4eb7-8de4-b4e17e135051.png differ diff --git a/static/graphs/c1092c4f-91a1-469a-a144-c5d10a94fed6 b/static/graphs/c1092c4f-91a1-469a-a144-c5d10a94fed6 new file mode 100644 index 0000000..513d640 --- /dev/null +++ b/static/graphs/c1092c4f-91a1-469a-a144-c5d10a94fed6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-DLL" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c1092c4f-91a1-469a-a144-c5d10a94fed6.png b/static/graphs/c1092c4f-91a1-469a-a144-c5d10a94fed6.png new file mode 100644 index 0000000..4a79189 Binary files /dev/null and b/static/graphs/c1092c4f-91a1-469a-a144-c5d10a94fed6.png differ diff --git a/static/graphs/c11ac61d-50f4-444f-85d8-6f006067f0de b/static/graphs/c11ac61d-50f4-444f-85d8-6f006067f0de new file mode 100644 index 0000000..5a72f1b --- /dev/null +++ b/static/graphs/c11ac61d-50f4-444f-85d8-6f006067f0de @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=route - S0103" [label="mitre-enterprise-attack-tool\nroute - S0103",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=route - S0103" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];} diff --git a/static/graphs/c11ac61d-50f4-444f-85d8-6f006067f0de.png b/static/graphs/c11ac61d-50f4-444f-85d8-6f006067f0de.png new file mode 100644 index 0000000..c1db457 Binary files /dev/null and b/static/graphs/c11ac61d-50f4-444f-85d8-6f006067f0de.png differ diff --git a/static/graphs/c1676218-c16a-41c9-8f7a-023779916e39 b/static/graphs/c1676218-c16a-41c9-8f7a-023779916e39 new file mode 100644 index 0000000..89a0aa8 --- /dev/null +++ b/static/graphs/c1676218-c16a-41c9-8f7a-023779916e39 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=System Network Connections Discovery Mitigation - T1049" [label="mitre-enterprise-attack-course-of-action\nSystem Network Connections Discovery Mitigation - T1049",shape=ellipse];"mitre-enterprise-attack-course-of-action=System Network Connections Discovery Mitigation - T1049" -> "mitre-enterprise-attack-attack-pattern=System Network Connections Discovery - T1049" [label="mitigates",];} diff --git a/static/graphs/c1676218-c16a-41c9-8f7a-023779916e39.png b/static/graphs/c1676218-c16a-41c9-8f7a-023779916e39.png new file mode 100644 index 0000000..ab07a49 Binary files /dev/null and b/static/graphs/c1676218-c16a-41c9-8f7a-023779916e39.png differ diff --git a/static/graphs/c17f6e4b-70c5-42f8-a91b-19d73485bd04 b/static/graphs/c17f6e4b-70c5-42f8-a91b-19d73485bd04 new file mode 100644 index 0000000..79b62f1 --- /dev/null +++ b/static/graphs/c17f6e4b-70c5-42f8-a91b-19d73485bd04 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=Crisis" [label="android\nCrisis",shape=box,style=filled,color=deepskyblue];"android=Crisis" -> "malpedia=RCS" [label="similar",dir="both"];} diff --git a/static/graphs/c17f6e4b-70c5-42f8-a91b-19d73485bd04.png b/static/graphs/c17f6e4b-70c5-42f8-a91b-19d73485bd04.png new file mode 100644 index 0000000..589c782 Binary files /dev/null and b/static/graphs/c17f6e4b-70c5-42f8-a91b-19d73485bd04.png differ diff --git a/static/graphs/c251e4a5-9a2e-4166-8e42-442af75c3b9a b/static/graphs/c251e4a5-9a2e-4166-8e42-442af75c3b9a new file mode 100644 index 0000000..579d873 --- /dev/null +++ b/static/graphs/c251e4a5-9a2e-4166-8e42-442af75c3b9a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Nerex - S0210" [label="mitre-enterprise-attack-malware\nNerex - S0210",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Nerex - S0210" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/c251e4a5-9a2e-4166-8e42-442af75c3b9a.png b/static/graphs/c251e4a5-9a2e-4166-8e42-442af75c3b9a.png new file mode 100644 index 0000000..5a54e99 Binary files /dev/null and b/static/graphs/c251e4a5-9a2e-4166-8e42-442af75c3b9a.png differ diff --git a/static/graphs/c3a784ee-cef7-4604-a5ba-ec7b193a5152 b/static/graphs/c3a784ee-cef7-4604-a5ba-ec7b193a5152 new file mode 100644 index 0000000..a0e8bf4 --- /dev/null +++ b/static/graphs/c3a784ee-cef7-4604-a5ba-ec7b193a5152 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=qrat" [label="tool\nqrat",shape=box,style=filled,color=deepskyblue];"tool=qrat" -> "rat=Qarallax" [label="similar",dir="both"];"rat=Qarallax" [label="rat\nQarallax",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c3a784ee-cef7-4604-a5ba-ec7b193a5152.png b/static/graphs/c3a784ee-cef7-4604-a5ba-ec7b193a5152.png new file mode 100644 index 0000000..72cf617 Binary files /dev/null and b/static/graphs/c3a784ee-cef7-4604-a5ba-ec7b193a5152.png differ diff --git a/static/graphs/c3c20c4b-e12a-42e5-960a-eea4644014f4 b/static/graphs/c3c20c4b-e12a-42e5-960a-eea4644014f4 new file mode 100644 index 0000000..0089ac9 --- /dev/null +++ b/static/graphs/c3c20c4b-e12a-42e5-960a-eea4644014f4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Janicab" [label="tool\nJanicab",shape=box,style=filled,color=deepskyblue];"tool=Janicab" -> "mitre-enterprise-attack-malware=Janicab - S0163" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Janicab - S0163" [label="mitre-enterprise-attack-malware\nJanicab - S0163",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Janicab - S0163" -> "mitre-enterprise-attack-attack-pattern=Local Job Scheduling - T1168" [label="uses",];} diff --git a/static/graphs/c3c20c4b-e12a-42e5-960a-eea4644014f4.png b/static/graphs/c3c20c4b-e12a-42e5-960a-eea4644014f4.png new file mode 100644 index 0000000..fe87516 Binary files /dev/null and b/static/graphs/c3c20c4b-e12a-42e5-960a-eea4644014f4.png differ diff --git a/static/graphs/c3cf2312-3aab-4aaf-86e6-ab3505430482 b/static/graphs/c3cf2312-3aab-4aaf-86e6-ab3505430482 new file mode 100644 index 0000000..ffa7caa --- /dev/null +++ b/static/graphs/c3cf2312-3aab-4aaf-86e6-ab3505430482 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Rc.common Mitigation - T1163" [label="mitre-enterprise-attack-course-of-action\nRc.common Mitigation - T1163",shape=ellipse];"mitre-enterprise-attack-course-of-action=Rc.common Mitigation - T1163" -> "mitre-enterprise-attack-attack-pattern=Rc.common - T1163" [label="mitigates",];} diff --git a/static/graphs/c3cf2312-3aab-4aaf-86e6-ab3505430482.png b/static/graphs/c3cf2312-3aab-4aaf-86e6-ab3505430482.png new file mode 100644 index 0000000..3cf4c6b Binary files /dev/null and b/static/graphs/c3cf2312-3aab-4aaf-86e6-ab3505430482.png differ diff --git a/static/graphs/c3cf4e88-704b-4d7c-8185-ee780804f3d3 b/static/graphs/c3cf4e88-704b-4d7c-8185-ee780804f3d3 new file mode 100644 index 0000000..c6ba006 --- /dev/null +++ b/static/graphs/c3cf4e88-704b-4d7c-8185-ee780804f3d3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=CyberGate" [label="rat\nCyberGate",shape=box,style=filled,color=deepskyblue];"rat=CyberGate" -> "malpedia=CyberGate" [label="similar",dir="both"];} diff --git a/static/graphs/c3cf4e88-704b-4d7c-8185-ee780804f3d3.png b/static/graphs/c3cf4e88-704b-4d7c-8185-ee780804f3d3.png new file mode 100644 index 0000000..a7d3359 Binary files /dev/null and b/static/graphs/c3cf4e88-704b-4d7c-8185-ee780804f3d3.png differ diff --git a/static/graphs/c416b28c-103b-4df1-909e-78089a7e0e5f b/static/graphs/c416b28c-103b-4df1-909e-78089a7e0e5f new file mode 100644 index 0000000..5a240e4 --- /dev/null +++ b/static/graphs/c416b28c-103b-4df1-909e-78089a7e0e5f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=RTM - G0048" [label="mitre-enterprise-attack-intrusion-set\nRTM - G0048",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=RTM - G0048" -> "mitre-enterprise-attack-malware=RTM - S0148" [label="uses",];"mitre-enterprise-attack-malware=RTM - S0148" [label="mitre-enterprise-attack-malware\nRTM - S0148",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RTM - S0148" -> "malpedia=RTM" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RTM - S0148" -> "mitre-enterprise-attack-attack-pattern=Install Root Certificate - T1130" [label="uses",];} diff --git a/static/graphs/c416b28c-103b-4df1-909e-78089a7e0e5f.png b/static/graphs/c416b28c-103b-4df1-909e-78089a7e0e5f.png new file mode 100644 index 0000000..e26f080 Binary files /dev/null and b/static/graphs/c416b28c-103b-4df1-909e-78089a7e0e5f.png differ diff --git a/static/graphs/c47a9b55-8f61-4b82-b833-1db6242c754e b/static/graphs/c47a9b55-8f61-4b82-b833-1db6242c754e new file mode 100644 index 0000000..3b437cf --- /dev/null +++ b/static/graphs/c47a9b55-8f61-4b82-b833-1db6242c754e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Local Job Scheduling Mitigation - T1168" [label="mitre-enterprise-attack-course-of-action\nLocal Job Scheduling Mitigation - T1168",shape=ellipse];"mitre-enterprise-attack-course-of-action=Local Job Scheduling Mitigation - T1168" -> "mitre-enterprise-attack-attack-pattern=Local Job Scheduling - T1168" [label="mitigates",];} diff --git a/static/graphs/c47a9b55-8f61-4b82-b833-1db6242c754e.png b/static/graphs/c47a9b55-8f61-4b82-b833-1db6242c754e.png new file mode 100644 index 0000000..a354e1f Binary files /dev/null and b/static/graphs/c47a9b55-8f61-4b82-b833-1db6242c754e.png differ diff --git a/static/graphs/c47f937f-1022-4f42-8525-e7a4779a14cb b/static/graphs/c47f937f-1022-4f42-8525-e7a4779a14cb new file mode 100644 index 0000000..45b383a --- /dev/null +++ b/static/graphs/c47f937f-1022-4f42-8525-e7a4779a14cb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=APT12 - G0005" [label="mitre-enterprise-attack-intrusion-set\nAPT12 - G0005",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT12 - G0005" -> "threat-actor=IXESHE" [label="similar",dir="both"];"mitre-pre-attack-intrusion-set=APT12 - G0005" [label="mitre-pre-attack-intrusion-set\nAPT12 - G0005",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT12 - G0005" -> "mitre-enterprise-attack-malware=Ixeshe - S0015" [label="uses",];"mitre-pre-attack-intrusion-set=APT12 - G0005" -> "mitre-enterprise-attack-malware=RIPTIDE - S0003" [label="uses",];"mitre-pre-attack-intrusion-set=APT12 - G0005" -> "mitre-enterprise-attack-attack-pattern=Web Service - T1102" [label="uses",];"mitre-enterprise-attack-malware=Ixeshe - S0015" [label="mitre-enterprise-attack-malware\nIxeshe - S0015",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Ixeshe - S0015" -> "mitre-enterprise-attack-attack-pattern=Data Obfuscation - T1001" [label="uses",];"mitre-enterprise-attack-malware=RIPTIDE - S0003" [label="mitre-enterprise-attack-malware\nRIPTIDE - S0003",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=RIPTIDE - S0003" -> "tool=Etumbot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=RIPTIDE - S0003" -> "mitre-enterprise-attack-attack-pattern=Commonly Used Port - T1043" [label="uses",];"threat-actor=IXESHE" [label="threat-actor\nIXESHE",shape=octagon,style=filled,color=indianred1];"tool=Etumbot" [label="tool\nEtumbot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c47f937f-1022-4f42-8525-e7a4779a14cb.png b/static/graphs/c47f937f-1022-4f42-8525-e7a4779a14cb.png new file mode 100644 index 0000000..c19fafa Binary files /dev/null and b/static/graphs/c47f937f-1022-4f42-8525-e7a4779a14cb.png differ diff --git a/static/graphs/c4ce1174-9462-47e9-8038-794f40a184b3 b/static/graphs/c4ce1174-9462-47e9-8038-794f40a184b3 new file mode 100644 index 0000000..8365a5c --- /dev/null +++ b/static/graphs/c4ce1174-9462-47e9-8038-794f40a184b3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=SideWinder" [label="threat-actor\nSideWinder",shape=octagon,style=filled,color=indianred1];"threat-actor=SideWinder" -> "malpedia=SideWinder" [label="similar",dir="both"];} diff --git a/static/graphs/c4ce1174-9462-47e9-8038-794f40a184b3.png b/static/graphs/c4ce1174-9462-47e9-8038-794f40a184b3.png new file mode 100644 index 0000000..b988ac4 Binary files /dev/null and b/static/graphs/c4ce1174-9462-47e9-8038-794f40a184b3.png differ diff --git a/static/graphs/c4de7d83-e875-4c88-8b5d-06c41e5b7e79 b/static/graphs/c4de7d83-e875-4c88-8b5d-06c41e5b7e79 new file mode 100644 index 0000000..662d51b --- /dev/null +++ b/static/graphs/c4de7d83-e875-4c88-8b5d-06c41e5b7e79 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=PUNCHTRACK - S0197" [label="mitre-enterprise-attack-malware\nPUNCHTRACK - S0197",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PUNCHTRACK - S0197" -> "mitre-enterprise-attack-attack-pattern=Data Staged - T1074" [label="uses",];} diff --git a/static/graphs/c4de7d83-e875-4c88-8b5d-06c41e5b7e79.png b/static/graphs/c4de7d83-e875-4c88-8b5d-06c41e5b7e79.png new file mode 100644 index 0000000..684a220 Binary files /dev/null and b/static/graphs/c4de7d83-e875-4c88-8b5d-06c41e5b7e79.png differ diff --git a/static/graphs/c5574ca0-d5a4-490a-b207-e4658e5fd1d7 b/static/graphs/c5574ca0-d5a4-490a-b207-e4658e5fd1d7 new file mode 100644 index 0000000..2811dd4 --- /dev/null +++ b/static/graphs/c5574ca0-d5a4-490a-b207-e4658e5fd1d7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Scarlet Mimic - G0029" [label="mitre-enterprise-attack-intrusion-set\nScarlet Mimic - G0029",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Scarlet Mimic - G0029" -> "threat-actor=Scarlet Mimic" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Scarlet Mimic - G0029" -> "mitre-enterprise-attack-malware=Psylo - S0078" [label="uses",];"mitre-enterprise-attack-malware=Psylo - S0078" [label="mitre-enterprise-attack-malware\nPsylo - S0078",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Psylo - S0078" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];"threat-actor=Scarlet Mimic" [label="threat-actor\nScarlet Mimic",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/c5574ca0-d5a4-490a-b207-e4658e5fd1d7.png b/static/graphs/c5574ca0-d5a4-490a-b207-e4658e5fd1d7.png new file mode 100644 index 0000000..ddb4ebc Binary files /dev/null and b/static/graphs/c5574ca0-d5a4-490a-b207-e4658e5fd1d7.png differ diff --git a/static/graphs/c5947e1c-1cbc-434c-94b8-27c7e3be0fff b/static/graphs/c5947e1c-1cbc-434c-94b8-27c7e3be0fff new file mode 100644 index 0000000..235acec --- /dev/null +++ b/static/graphs/c5947e1c-1cbc-434c-94b8-27c7e3be0fff @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" [label="mitre-enterprise-attack-intrusion-set\nWinnti Group - G0044",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" -> "threat-actor=Aurora Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" -> "threat-actor=Axiom" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" -> "mitre-enterprise-attack-intrusion-set=Axiom - G0001" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" -> "mitre-pre-attack-intrusion-set=APT17 - G0025" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Winnti Group - G0044" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];"mitre-enterprise-attack-intrusion-set=APT17 - G0025" [label="mitre-enterprise-attack-intrusion-set\nAPT17 - G0025",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" [label="mitre-enterprise-attack-intrusion-set\nAxiom - G0001",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Axiom - G0001" -> "mitre-enterprise-attack-attack-pattern=Exploit Public-Facing Application - T1190" [label="uses",];"mitre-pre-attack-intrusion-set=APT17 - G0025" [label="mitre-pre-attack-intrusion-set\nAPT17 - G0025",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT17 - G0025" -> "mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" [label="uses",];"threat-actor=Aurora Panda" [label="threat-actor\nAurora Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Axiom" [label="threat-actor\nAxiom",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" [label="mitre-enterprise-attack-malware\nBLACKCOFFEE - S0069",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/c5947e1c-1cbc-434c-94b8-27c7e3be0fff.png b/static/graphs/c5947e1c-1cbc-434c-94b8-27c7e3be0fff.png new file mode 100644 index 0000000..582fb10 Binary files /dev/null and b/static/graphs/c5947e1c-1cbc-434c-94b8-27c7e3be0fff.png differ diff --git a/static/graphs/c5e3766c-9527-47c3-94db-f10de2c56248 b/static/graphs/c5e3766c-9527-47c3-94db-f10de2c56248 new file mode 100644 index 0000000..62d30c9 --- /dev/null +++ b/static/graphs/c5e3766c-9527-47c3-94db-f10de2c56248 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=NewCT" [label="tool\nNewCT",shape=box,style=filled,color=deepskyblue];"tool=NewCT" -> "malpedia=NewCT" [label="similar",dir="both"];} diff --git a/static/graphs/c5e3766c-9527-47c3-94db-f10de2c56248.png b/static/graphs/c5e3766c-9527-47c3-94db-f10de2c56248.png new file mode 100644 index 0000000..a469ce7 Binary files /dev/null and b/static/graphs/c5e3766c-9527-47c3-94db-f10de2c56248.png differ diff --git a/static/graphs/c5e9cb46-aced-466c-85ea-7db5572ad9ec b/static/graphs/c5e9cb46-aced-466c-85ea-7db5572ad9ec new file mode 100644 index 0000000..9efbbc1 --- /dev/null +++ b/static/graphs/c5e9cb46-aced-466c-85ea-7db5572ad9ec @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Trojan.Mebromi - S0001" [label="mitre-enterprise-attack-malware\nTrojan.Mebromi - S0001",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Trojan.Mebromi - S0001" -> "mitre-enterprise-attack-attack-pattern=System Firmware - T1019" [label="uses",];} diff --git a/static/graphs/c5e9cb46-aced-466c-85ea-7db5572ad9ec.png b/static/graphs/c5e9cb46-aced-466c-85ea-7db5572ad9ec.png new file mode 100644 index 0000000..7eed935 Binary files /dev/null and b/static/graphs/c5e9cb46-aced-466c-85ea-7db5572ad9ec.png differ diff --git a/static/graphs/c60776a6-91dd-499b-8b4c-7940479e71fc b/static/graphs/c60776a6-91dd-499b-8b4c-7940479e71fc new file mode 100644 index 0000000..580f730 --- /dev/null +++ b/static/graphs/c60776a6-91dd-499b-8b4c-7940479e71fc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Maze" [label="ransomware\nMaze",shape=box,style=filled,color=deepskyblue];"ransomware=Maze" -> "ransomware=Ragnar Locker" [label="related-to",];"ransomware=Ragnar Locker" [label="ransomware\nRagnar Locker",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c60776a6-91dd-499b-8b4c-7940479e71fc.png b/static/graphs/c60776a6-91dd-499b-8b4c-7940479e71fc.png new file mode 100644 index 0000000..ddfddd6 Binary files /dev/null and b/static/graphs/c60776a6-91dd-499b-8b4c-7940479e71fc.png differ diff --git a/static/graphs/c61fee9f-16fb-4f8c-bbf0-869093fcd4a6 b/static/graphs/c61fee9f-16fb-4f8c-bbf0-869093fcd4a6 new file mode 100644 index 0000000..dd63085 --- /dev/null +++ b/static/graphs/c61fee9f-16fb-4f8c-bbf0-869093fcd4a6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Access Token Manipulation Mitigation - T1134" [label="mitre-enterprise-attack-course-of-action\nAccess Token Manipulation Mitigation - T1134",shape=ellipse];"mitre-enterprise-attack-course-of-action=Access Token Manipulation Mitigation - T1134" -> "mitre-enterprise-attack-attack-pattern=Access Token Manipulation - T1134" [label="mitigates",];} diff --git a/static/graphs/c61fee9f-16fb-4f8c-bbf0-869093fcd4a6.png b/static/graphs/c61fee9f-16fb-4f8c-bbf0-869093fcd4a6.png new file mode 100644 index 0000000..31e647f Binary files /dev/null and b/static/graphs/c61fee9f-16fb-4f8c-bbf0-869093fcd4a6.png differ diff --git a/static/graphs/c620e3a1-fff5-424f-abea-d2b0f3616f67 b/static/graphs/c620e3a1-fff5-424f-abea-d2b0f3616f67 new file mode 100644 index 0000000..7fca73c --- /dev/null +++ b/static/graphs/c620e3a1-fff5-424f-abea-d2b0f3616f67 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=System Information Discovery Mitigation - T1082" [label="mitre-enterprise-attack-course-of-action\nSystem Information Discovery Mitigation - T1082",shape=ellipse];"mitre-enterprise-attack-course-of-action=System Information Discovery Mitigation - T1082" -> "mitre-enterprise-attack-attack-pattern=System Information Discovery - T1082" [label="mitigates",];} diff --git a/static/graphs/c620e3a1-fff5-424f-abea-d2b0f3616f67.png b/static/graphs/c620e3a1-fff5-424f-abea-d2b0f3616f67.png new file mode 100644 index 0000000..a1bce67 Binary files /dev/null and b/static/graphs/c620e3a1-fff5-424f-abea-d2b0f3616f67.png differ diff --git a/static/graphs/c6472ae1-c6ad-4cf1-8d6e-8c94b94fe314 b/static/graphs/c6472ae1-c6ad-4cf1-8d6e-8c94b94fe314 new file mode 100644 index 0000000..e51f4bf --- /dev/null +++ b/static/graphs/c6472ae1-c6ad-4cf1-8d6e-8c94b94fe314 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=TA459" [label="threat-actor\nTA459",shape=octagon,style=filled,color=indianred1];"threat-actor=TA459" -> "mitre-enterprise-attack-intrusion-set=TA459 - G0062" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=TA459 - G0062" [label="mitre-enterprise-attack-intrusion-set\nTA459 - G0062",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=TA459 - G0062" -> "mitre-enterprise-attack-malware=PlugX - S0013" [label="uses",];"mitre-enterprise-attack-malware=PlugX - S0013" [label="mitre-enterprise-attack-malware\nPlugX - S0013",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PlugX - S0013" -> "rat=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "tool=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "malpedia=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "mitre-enterprise-attack-attack-pattern=Query Registry - T1012" [label="uses",];"rat=PlugX" [label="rat\nPlugX",shape=box,style=filled,color=deepskyblue];"tool=PlugX" [label="tool\nPlugX",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c6472ae1-c6ad-4cf1-8d6e-8c94b94fe314.png b/static/graphs/c6472ae1-c6ad-4cf1-8d6e-8c94b94fe314.png new file mode 100644 index 0000000..37544ac Binary files /dev/null and b/static/graphs/c6472ae1-c6ad-4cf1-8d6e-8c94b94fe314.png differ diff --git a/static/graphs/c709da93-20c3-4d17-ab68-48cba76b2137 b/static/graphs/c709da93-20c3-4d17-ab68-48cba76b2137 new file mode 100644 index 0000000..58ac19f --- /dev/null +++ b/static/graphs/c709da93-20c3-4d17-ab68-48cba76b2137 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=PJApps - MOB-S0007" [label="mitre-mobile-attack-malware\nPJApps - MOB-S0007",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=PJApps - MOB-S0007" -> "mitre-mobile-attack-attack-pattern=Local Network Configuration Discovery - MOB-T1025" [label="uses",];"mitre-mobile-attack-malware=PJApps - MOB-S0007" -> "mitre-mobile-attack-attack-pattern=Premium SMS Toll Fraud - MOB-T1051" [label="uses",];} diff --git a/static/graphs/c709da93-20c3-4d17-ab68-48cba76b2137.png b/static/graphs/c709da93-20c3-4d17-ab68-48cba76b2137.png new file mode 100644 index 0000000..80abef0 Binary files /dev/null and b/static/graphs/c709da93-20c3-4d17-ab68-48cba76b2137.png differ diff --git a/static/graphs/c71819a4-f6ce-4265-b0cd-24a98d84321c b/static/graphs/c71819a4-f6ce-4265-b0cd-24a98d84321c new file mode 100644 index 0000000..660c9a3 --- /dev/null +++ b/static/graphs/c71819a4-f6ce-4265-b0cd-24a98d84321c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=HolyCrypt" [label="ransomware\nHolyCrypt",shape=box,style=filled,color=deepskyblue];"ransomware=HolyCrypt" -> "ransomware=Dablio Ransomware" [label="similar",dir="both"];"ransomware=Dablio Ransomware" [label="ransomware\nDablio Ransomware",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c71819a4-f6ce-4265-b0cd-24a98d84321c.png b/static/graphs/c71819a4-f6ce-4265-b0cd-24a98d84321c.png new file mode 100644 index 0000000..9025b12 Binary files /dev/null and b/static/graphs/c71819a4-f6ce-4265-b0cd-24a98d84321c.png differ diff --git a/static/graphs/c721b235-679a-4d76-9ae9-e08921fccf84 b/static/graphs/c721b235-679a-4d76-9ae9-e08921fccf84 new file mode 100644 index 0000000..b378b81 --- /dev/null +++ b/static/graphs/c721b235-679a-4d76-9ae9-e08921fccf84 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1025" [label="mitre-pre-attack-attack-pattern\nIdentify job postings and needs/gaps - PRE-T1025",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1025" -> "mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1055" [label="related-to",];"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1055" [label="mitre-pre-attack-attack-pattern\nIdentify job postings and needs/gaps - PRE-T1055",shape=ellipse];"mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1055" -> "mitre-pre-attack-attack-pattern=Identify job postings and needs/gaps - PRE-T1025" [label="related-to",];} diff --git a/static/graphs/c721b235-679a-4d76-9ae9-e08921fccf84.png b/static/graphs/c721b235-679a-4d76-9ae9-e08921fccf84.png new file mode 100644 index 0000000..9db713a Binary files /dev/null and b/static/graphs/c721b235-679a-4d76-9ae9-e08921fccf84.png differ diff --git a/static/graphs/c76110ea-15f1-4adf-a28d-c707374dbb3a b/static/graphs/c76110ea-15f1-4adf-a28d-c707374dbb3a new file mode 100644 index 0000000..c2064d0 --- /dev/null +++ b/static/graphs/c76110ea-15f1-4adf-a28d-c707374dbb3a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c76110ea-15f1-4adf-a28d-c707374dbb3a.png b/static/graphs/c76110ea-15f1-4adf-a28d-c707374dbb3a.png new file mode 100644 index 0000000..6681599 Binary files /dev/null and b/static/graphs/c76110ea-15f1-4adf-a28d-c707374dbb3a.png differ diff --git a/static/graphs/c80a6bef-b3ce-44d0-b113-946e93124898 b/static/graphs/c80a6bef-b3ce-44d0-b113-946e93124898 new file mode 100644 index 0000000..4f06ee7 --- /dev/null +++ b/static/graphs/c80a6bef-b3ce-44d0-b113-946e93124898 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=Shedun - MOB-S0010" [label="mitre-mobile-attack-malware\nShedun - MOB-S0010",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Shedun - MOB-S0010" -> "android=Kemoge" [label="similar",dir="both"];"mitre-mobile-attack-malware=Shedun - MOB-S0010" -> "mitre-mobile-attack-attack-pattern=Repackaged Application - MOB-T1047" [label="uses",];"mitre-mobile-attack-malware=Shedun - MOB-S0010" -> "mitre-mobile-attack-attack-pattern=Exploit OS Vulnerability - MOB-T1007" [label="uses",];"android=Kemoge" [label="android\nKemoge",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c80a6bef-b3ce-44d0-b113-946e93124898.png b/static/graphs/c80a6bef-b3ce-44d0-b113-946e93124898.png new file mode 100644 index 0000000..1eb3ffd Binary files /dev/null and b/static/graphs/c80a6bef-b3ce-44d0-b113-946e93124898.png differ diff --git a/static/graphs/c82c904f-b3b4-40a2-bf0d-008912953104 b/static/graphs/c82c904f-b3b4-40a2-bf0d-008912953104 new file mode 100644 index 0000000..0358044 --- /dev/null +++ b/static/graphs/c82c904f-b3b4-40a2-bf0d-008912953104 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="similar",dir="both"];"rat=PoisonIvy" -> "tool=poisonivy" [label="similar",dir="both"];"rat=PoisonIvy" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c82c904f-b3b4-40a2-bf0d-008912953104.png b/static/graphs/c82c904f-b3b4-40a2-bf0d-008912953104.png new file mode 100644 index 0000000..406ff33 Binary files /dev/null and b/static/graphs/c82c904f-b3b4-40a2-bf0d-008912953104.png differ diff --git a/static/graphs/c85a41a8-a0a1-4963-894f-84bb980e6e86 b/static/graphs/c85a41a8-a0a1-4963-894f-84bb980e6e86 new file mode 100644 index 0000000..1dc8090 --- /dev/null +++ b/static/graphs/c85a41a8-a0a1-4963-894f-84bb980e6e86 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Rakhni" [label="ransomware\nRakhni",shape=box,style=filled,color=deepskyblue];"ransomware=Rakhni" -> "ransomware=Bandarchor" [label="similar",dir="both"];"ransomware=Bandarchor" [label="ransomware\nBandarchor",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c85a41a8-a0a1-4963-894f-84bb980e6e86.png b/static/graphs/c85a41a8-a0a1-4963-894f-84bb980e6e86.png new file mode 100644 index 0000000..2923f23 Binary files /dev/null and b/static/graphs/c85a41a8-a0a1-4963-894f-84bb980e6e86.png differ diff --git a/static/graphs/c861bcb1-946f-450d-ab75-d4e3c1103a56 b/static/graphs/c861bcb1-946f-450d-ab75-d4e3c1103a56 new file mode 100644 index 0000000..089d8fe --- /dev/null +++ b/static/graphs/c861bcb1-946f-450d-ab75-d4e3c1103a56 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Spearphishing via Service Mitigation - T1194" [label="mitre-enterprise-attack-course-of-action\nSpearphishing via Service Mitigation - T1194",shape=ellipse];"mitre-enterprise-attack-course-of-action=Spearphishing via Service Mitigation - T1194" -> "mitre-enterprise-attack-attack-pattern=Spearphishing via Service - T1194" [label="mitigates",];} diff --git a/static/graphs/c861bcb1-946f-450d-ab75-d4e3c1103a56.png b/static/graphs/c861bcb1-946f-450d-ab75-d4e3c1103a56.png new file mode 100644 index 0000000..6a65a6b Binary files /dev/null and b/static/graphs/c861bcb1-946f-450d-ab75-d4e3c1103a56.png differ diff --git a/static/graphs/c8770c81-c29f-40d2-a140-38544206b2b4 b/static/graphs/c8770c81-c29f-40d2-a140-38544206b2b4 new file mode 100644 index 0000000..9d44884 --- /dev/null +++ b/static/graphs/c8770c81-c29f-40d2-a140-38544206b2b4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=HummingBad - MOB-S0038" [label="mitre-mobile-attack-malware\nHummingBad - MOB-S0038",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=HummingBad - MOB-S0038" -> "android=HummingBad" [label="similar",dir="both"];"mitre-mobile-attack-malware=HummingBad - MOB-S0038" -> "mitre-mobile-attack-attack-pattern=Generate Fraudulent Advertising Revenue - MOB-T1075" [label="uses",];"mitre-mobile-attack-malware=HummingBad - MOB-S0038" -> "mitre-mobile-attack-attack-pattern=Manipulate App Store Rankings or Ratings - MOB-T1055" [label="uses",];"android=HummingBad" [label="android\nHummingBad",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/c8770c81-c29f-40d2-a140-38544206b2b4.png b/static/graphs/c8770c81-c29f-40d2-a140-38544206b2b4.png new file mode 100644 index 0000000..c52e247 Binary files /dev/null and b/static/graphs/c8770c81-c29f-40d2-a140-38544206b2b4.png differ diff --git a/static/graphs/c88151a5-fe3f-4773-8147-d801587065a4 b/static/graphs/c88151a5-fe3f-4773-8147-d801587065a4 new file mode 100644 index 0000000..1c51982 --- /dev/null +++ b/static/graphs/c88151a5-fe3f-4773-8147-d801587065a4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Application Deployment Software Mitigation - T1017" [label="mitre-enterprise-attack-course-of-action\nApplication Deployment Software Mitigation - T1017",shape=ellipse];"mitre-enterprise-attack-course-of-action=Application Deployment Software Mitigation - T1017" -> "mitre-enterprise-attack-attack-pattern=Application Deployment Software - T1017" [label="mitigates",];} diff --git a/static/graphs/c88151a5-fe3f-4773-8147-d801587065a4.png b/static/graphs/c88151a5-fe3f-4773-8147-d801587065a4.png new file mode 100644 index 0000000..beb6ca5 Binary files /dev/null and b/static/graphs/c88151a5-fe3f-4773-8147-d801587065a4.png differ diff --git a/static/graphs/c91c304a-975d-4501-9789-0db1c57afd3f b/static/graphs/c91c304a-975d-4501-9789-0db1c57afd3f new file mode 100644 index 0000000..137391d --- /dev/null +++ b/static/graphs/c91c304a-975d-4501-9789-0db1c57afd3f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Exploit Baseband Vulnerability - MOB-T1058" [label="mitre-mobile-attack-attack-pattern\nExploit Baseband Vulnerability - MOB-T1058",shape=ellipse];} diff --git a/static/graphs/c91c304a-975d-4501-9789-0db1c57afd3f.png b/static/graphs/c91c304a-975d-4501-9789-0db1c57afd3f.png new file mode 100644 index 0000000..967636d Binary files /dev/null and b/static/graphs/c91c304a-975d-4501-9789-0db1c57afd3f.png differ diff --git a/static/graphs/c93fccb1-e8e8-42cf-ae33-2ad1d183913a b/static/graphs/c93fccb1-e8e8-42cf-ae33-2ad1d183913a new file mode 100644 index 0000000..64a311e --- /dev/null +++ b/static/graphs/c93fccb1-e8e8-42cf-ae33-2ad1d183913a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" [label="mitre-enterprise-attack-intrusion-set\nLazarus Group - G0032",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" -> "threat-actor=Lazarus Group" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Lazarus Group - G0032" -> "mitre-enterprise-attack-attack-pattern=Windows Admin Shares - T1077" [label="uses",];"threat-actor=Lazarus Group" [label="threat-actor\nLazarus Group",shape=octagon,style=filled,color=indianred1];"threat-actor=Lazarus Group" -> "threat-actor=Operation Sharpshooter" [label="similar",dir="both"];"threat-actor=Lazarus Group" -> "threat-actor=APT37" [label="linked-to",];"threat-actor=APT37" [label="threat-actor\nAPT37",shape=octagon,style=filled,color=indianred1];"threat-actor=APT37" -> "mitre-enterprise-attack-intrusion-set=APT37 - G0067" [label="similar",dir="both"];"threat-actor=APT37" -> "threat-actor=Lazarus Group" [label="linked-to",];"threat-actor=Operation Sharpshooter" [label="threat-actor\nOperation Sharpshooter",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT37 - G0067" [label="mitre-enterprise-attack-intrusion-set\nAPT37 - G0067",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT37 - G0067" -> "mitre-enterprise-attack-attack-pattern=Custom Command and Control Protocol - T1094" [label="uses",];} diff --git a/static/graphs/c93fccb1-e8e8-42cf-ae33-2ad1d183913a.png b/static/graphs/c93fccb1-e8e8-42cf-ae33-2ad1d183913a.png new file mode 100644 index 0000000..70a8296 Binary files /dev/null and b/static/graphs/c93fccb1-e8e8-42cf-ae33-2ad1d183913a.png differ diff --git a/static/graphs/c95c8b5c-b431-43c9-9557-f494805e2502 b/static/graphs/c95c8b5c-b431-43c9-9557-f494805e2502 new file mode 100644 index 0000000..4d109ff --- /dev/null +++ b/static/graphs/c95c8b5c-b431-43c9-9557-f494805e2502 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Software Packing Mitigation - T1045" [label="mitre-enterprise-attack-course-of-action\nSoftware Packing Mitigation - T1045",shape=ellipse];"mitre-enterprise-attack-course-of-action=Software Packing Mitigation - T1045" -> "mitre-enterprise-attack-attack-pattern=Software Packing - T1045" [label="mitigates",];} diff --git a/static/graphs/c95c8b5c-b431-43c9-9557-f494805e2502.png b/static/graphs/c95c8b5c-b431-43c9-9557-f494805e2502.png new file mode 100644 index 0000000..bf0e509 Binary files /dev/null and b/static/graphs/c95c8b5c-b431-43c9-9557-f494805e2502.png differ diff --git a/static/graphs/c9703cd3-141c-43a0-a926-380082be5d04 b/static/graphs/c9703cd3-141c-43a0-a926-380082be5d04 new file mode 100644 index 0000000..d3bd612 --- /dev/null +++ b/static/graphs/c9703cd3-141c-43a0-a926-380082be5d04 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=schtasks - S0111" [label="mitre-enterprise-attack-tool\nschtasks - S0111",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=schtasks - S0111" -> "mitre-enterprise-attack-attack-pattern=Scheduled Task - T1053" [label="uses",];} diff --git a/static/graphs/c9703cd3-141c-43a0-a926-380082be5d04.png b/static/graphs/c9703cd3-141c-43a0-a926-380082be5d04.png new file mode 100644 index 0000000..ca83a79 Binary files /dev/null and b/static/graphs/c9703cd3-141c-43a0-a926-380082be5d04.png differ diff --git a/static/graphs/c9b4ec27-0a43-4671-a967-bcac5df0e056 b/static/graphs/c9b4ec27-0a43-4671-a967-bcac5df0e056 new file mode 100644 index 0000000..6cc59c8 --- /dev/null +++ b/static/graphs/c9b4ec27-0a43-4671-a967-bcac5df0e056 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=EvilGrab" [label="tool\nEvilGrab",shape=box,style=filled,color=deepskyblue];"tool=EvilGrab" -> "mitre-enterprise-attack-malware=EvilGrab - S0152" [label="similar",dir="both"];"tool=EvilGrab" -> "malpedia=EvilGrab" [label="similar",dir="both"];"mitre-enterprise-attack-malware=EvilGrab - S0152" [label="mitre-enterprise-attack-malware\nEvilGrab - S0152",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=EvilGrab - S0152" -> "mitre-enterprise-attack-attack-pattern=Commonly Used Port - T1043" [label="uses",];} diff --git a/static/graphs/c9b4ec27-0a43-4671-a967-bcac5df0e056.png b/static/graphs/c9b4ec27-0a43-4671-a967-bcac5df0e056.png new file mode 100644 index 0000000..e976694 Binary files /dev/null and b/static/graphs/c9b4ec27-0a43-4671-a967-bcac5df0e056.png differ diff --git a/static/graphs/c9cd7ec9-40b7-49db-80be-1399eddd9c52 b/static/graphs/c9cd7ec9-40b7-49db-80be-1399eddd9c52 new file mode 100644 index 0000000..4afc7fc --- /dev/null +++ b/static/graphs/c9cd7ec9-40b7-49db-80be-1399eddd9c52 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Cachedump - S0119" [label="mitre-enterprise-attack-tool\nCachedump - S0119",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Cachedump - S0119" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];} diff --git a/static/graphs/c9cd7ec9-40b7-49db-80be-1399eddd9c52.png b/static/graphs/c9cd7ec9-40b7-49db-80be-1399eddd9c52.png new file mode 100644 index 0000000..952c926 Binary files /dev/null and b/static/graphs/c9cd7ec9-40b7-49db-80be-1399eddd9c52.png differ diff --git a/static/graphs/ca11e3f2-cda1-45dc-bed1-8708fa9e27a6 b/static/graphs/ca11e3f2-cda1-45dc-bed1-8708fa9e27a6 new file mode 100644 index 0000000..1d3498b --- /dev/null +++ b/static/graphs/ca11e3f2-cda1-45dc-bed1-8708fa9e27a6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Gheg" [label="botnet\nGheg",shape=box,style=filled,color=deepskyblue];"botnet=Gheg" -> "malpedia=Tofsee" [label="similar",dir="both"];} diff --git a/static/graphs/ca11e3f2-cda1-45dc-bed1-8708fa9e27a6.png b/static/graphs/ca11e3f2-cda1-45dc-bed1-8708fa9e27a6.png new file mode 100644 index 0000000..1ada1a9 Binary files /dev/null and b/static/graphs/ca11e3f2-cda1-45dc-bed1-8708fa9e27a6.png differ diff --git a/static/graphs/ca44dd5e-fd9e-48b5-99cb-0b2629b9265f b/static/graphs/ca44dd5e-fd9e-48b5-99cb-0b2629b9265f new file mode 100644 index 0000000..c9c7bf1 --- /dev/null +++ b/static/graphs/ca44dd5e-fd9e-48b5-99cb-0b2629b9265f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Cobalt Strike" [label="rat\nCobalt Strike",shape=box,style=filled,color=deepskyblue];"rat=Cobalt Strike" -> "mitre-enterprise-attack-tool=Cobalt Strike - S0154" [label="similar",dir="both"];"rat=Cobalt Strike" -> "malpedia=Cobalt Strike" [label="similar",dir="both"];"mitre-enterprise-attack-tool=Cobalt Strike - S0154" [label="mitre-enterprise-attack-tool\nCobalt Strike - S0154",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Cobalt Strike - S0154" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];} diff --git a/static/graphs/ca44dd5e-fd9e-48b5-99cb-0b2629b9265f.png b/static/graphs/ca44dd5e-fd9e-48b5-99cb-0b2629b9265f.png new file mode 100644 index 0000000..e4fef1e Binary files /dev/null and b/static/graphs/ca44dd5e-fd9e-48b5-99cb-0b2629b9265f.png differ diff --git a/static/graphs/ca4f63b9-a358-4214-bb26-8c912318cfde b/static/graphs/ca4f63b9-a358-4214-bb26-8c912318cfde new file mode 100644 index 0000000..938f7a2 --- /dev/null +++ b/static/graphs/ca4f63b9-a358-4214-bb26-8c912318cfde @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=OBAD - MOB-S0002" [label="mitre-mobile-attack-malware\nOBAD - MOB-S0002",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=OBAD - MOB-S0002" -> "mitre-mobile-attack-attack-pattern=Obfuscated or Encrypted Payload - MOB-T1009" [label="uses",];} diff --git a/static/graphs/ca4f63b9-a358-4214-bb26-8c912318cfde.png b/static/graphs/ca4f63b9-a358-4214-bb26-8c912318cfde.png new file mode 100644 index 0000000..eac06c9 Binary files /dev/null and b/static/graphs/ca4f63b9-a358-4214-bb26-8c912318cfde.png differ diff --git a/static/graphs/cafd0bf8-2b9c-46c7-ae3c-3e0f42c5062e b/static/graphs/cafd0bf8-2b9c-46c7-ae3c-3e0f42c5062e new file mode 100644 index 0000000..88d3887 --- /dev/null +++ b/static/graphs/cafd0bf8-2b9c-46c7-ae3c-3e0f42c5062e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=NetTraveler - S0033" [label="mitre-enterprise-attack-malware\nNetTraveler - S0033",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=NetTraveler - S0033" -> "tool=NetTraveler" [label="similar",dir="both"];"mitre-enterprise-attack-malware=NetTraveler - S0033" -> "malpedia=NetTraveler" [label="similar",dir="both"];"mitre-enterprise-attack-malware=NetTraveler - S0033" -> "mitre-enterprise-attack-attack-pattern=Application Window Discovery - T1010" [label="uses",];"tool=NetTraveler" [label="tool\nNetTraveler",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/cafd0bf8-2b9c-46c7-ae3c-3e0f42c5062e.png b/static/graphs/cafd0bf8-2b9c-46c7-ae3c-3e0f42c5062e.png new file mode 100644 index 0000000..ea8be84 Binary files /dev/null and b/static/graphs/cafd0bf8-2b9c-46c7-ae3c-3e0f42c5062e.png differ diff --git a/static/graphs/cb23f563-a8b9-4427-9884-594e8d3cc836 b/static/graphs/cb23f563-a8b9-4427-9884-594e8d3cc836 new file mode 100644 index 0000000..67361e0 --- /dev/null +++ b/static/graphs/cb23f563-a8b9-4427-9884-594e8d3cc836 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Cardinal" [label="rat\nCardinal",shape=box,style=filled,color=deepskyblue];"rat=Cardinal" -> "tool=EVILNUM" [label="similar",dir="both"];"tool=EVILNUM" [label="tool\nEVILNUM",shape=box,style=filled,color=deepskyblue];"tool=EVILNUM" -> "tool=Cardinal RAT" [label="similar",dir="both"];"tool=Cardinal RAT" [label="tool\nCardinal RAT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/cb23f563-a8b9-4427-9884-594e8d3cc836.png b/static/graphs/cb23f563-a8b9-4427-9884-594e8d3cc836.png new file mode 100644 index 0000000..d1c6e48 Binary files /dev/null and b/static/graphs/cb23f563-a8b9-4427-9884-594e8d3cc836.png differ diff --git a/static/graphs/cb69b20d-56d0-41ab-8440-4a4b251614d4 b/static/graphs/cb69b20d-56d0-41ab-8440-4a4b251614d4 new file mode 100644 index 0000000..e12e919 --- /dev/null +++ b/static/graphs/cb69b20d-56d0-41ab-8440-4a4b251614d4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Pupy - S0192" [label="mitre-enterprise-attack-tool\nPupy - S0192",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Pupy - S0192" -> "rat=Pupy" [label="similar",dir="both"];"mitre-enterprise-attack-tool=Pupy - S0192" -> "mitre-enterprise-attack-attack-pattern=Scripting - T1064" [label="uses",];"rat=Pupy" [label="rat\nPupy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/cb69b20d-56d0-41ab-8440-4a4b251614d4.png b/static/graphs/cb69b20d-56d0-41ab-8440-4a4b251614d4.png new file mode 100644 index 0000000..1fd7862 Binary files /dev/null and b/static/graphs/cb69b20d-56d0-41ab-8440-4a4b251614d4.png differ diff --git a/static/graphs/cb6c49ab-b9ac-459f-b765-05cbe2e63b0d b/static/graphs/cb6c49ab-b9ac-459f-b765-05cbe2e63b0d new file mode 100644 index 0000000..a335341 --- /dev/null +++ b/static/graphs/cb6c49ab-b9ac-459f-b765-05cbe2e63b0d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Matryoshka" [label="tool\nMatryoshka",shape=box,style=filled,color=deepskyblue];"tool=Matryoshka" -> "rat=Matryoshka" [label="similar",dir="both"];"rat=Matryoshka" [label="rat\nMatryoshka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/cb6c49ab-b9ac-459f-b765-05cbe2e63b0d.png b/static/graphs/cb6c49ab-b9ac-459f-b765-05cbe2e63b0d.png new file mode 100644 index 0000000..e129b43 Binary files /dev/null and b/static/graphs/cb6c49ab-b9ac-459f-b765-05cbe2e63b0d.png differ diff --git a/static/graphs/cb7bcf6f-085f-41db-81ee-4b68481661b5 b/static/graphs/cb7bcf6f-085f-41db-81ee-4b68481661b5 new file mode 100644 index 0000000..9673427 --- /dev/null +++ b/static/graphs/cb7bcf6f-085f-41db-81ee-4b68481661b5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=CallMe - S0077" [label="mitre-enterprise-attack-malware\nCallMe - S0077",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CallMe - S0077" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/cb7bcf6f-085f-41db-81ee-4b68481661b5.png b/static/graphs/cb7bcf6f-085f-41db-81ee-4b68481661b5.png new file mode 100644 index 0000000..0c51923 Binary files /dev/null and b/static/graphs/cb7bcf6f-085f-41db-81ee-4b68481661b5.png differ diff --git a/static/graphs/cb825b86-3f3b-4686-ba99-44878f5d3173 b/static/graphs/cb825b86-3f3b-4686-ba99-44878f5d3173 new file mode 100644 index 0000000..ed6dca8 --- /dev/null +++ b/static/graphs/cb825b86-3f3b-4686-ba99-44878f5d3173 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=BITS Jobs Mitigation - T1197" [label="mitre-enterprise-attack-course-of-action\nBITS Jobs Mitigation - T1197",shape=ellipse];"mitre-enterprise-attack-course-of-action=BITS Jobs Mitigation - T1197" -> "mitre-enterprise-attack-attack-pattern=BITS Jobs - T1197" [label="mitigates",];} diff --git a/static/graphs/cb825b86-3f3b-4686-ba99-44878f5d3173.png b/static/graphs/cb825b86-3f3b-4686-ba99-44878f5d3173.png new file mode 100644 index 0000000..c65b8a9 Binary files /dev/null and b/static/graphs/cb825b86-3f3b-4686-ba99-44878f5d3173.png differ diff --git a/static/graphs/cb8c8253-4024-4cc9-8989-b4a5f95f6c2f b/static/graphs/cb8c8253-4024-4cc9-8989-b4a5f95f6c2f new file mode 100644 index 0000000..0621ee1 --- /dev/null +++ b/static/graphs/cb8c8253-4024-4cc9-8989-b4a5f95f6c2f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="similar",dir="both"];"rat=PoisonIvy" -> "tool=poisonivy" [label="similar",dir="both"];"rat=PoisonIvy" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/cb8c8253-4024-4cc9-8989-b4a5f95f6c2f.png b/static/graphs/cb8c8253-4024-4cc9-8989-b4a5f95f6c2f.png new file mode 100644 index 0000000..51f53a3 Binary files /dev/null and b/static/graphs/cb8c8253-4024-4cc9-8989-b4a5f95f6c2f.png differ diff --git a/static/graphs/cba5667e-e3c6-44a4-811c-266dbc00e440 b/static/graphs/cba5667e-e3c6-44a4-811c-266dbc00e440 new file mode 100644 index 0000000..99e62b6 --- /dev/null +++ b/static/graphs/cba5667e-e3c6-44a4-811c-266dbc00e440 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Extra Window Memory Injection Mitigation - T1181" [label="mitre-enterprise-attack-course-of-action\nExtra Window Memory Injection Mitigation - T1181",shape=ellipse];"mitre-enterprise-attack-course-of-action=Extra Window Memory Injection Mitigation - T1181" -> "mitre-enterprise-attack-attack-pattern=Extra Window Memory Injection - T1181" [label="mitigates",];} diff --git a/static/graphs/cba5667e-e3c6-44a4-811c-266dbc00e440.png b/static/graphs/cba5667e-e3c6-44a4-811c-266dbc00e440.png new file mode 100644 index 0000000..2c4fba7 Binary files /dev/null and b/static/graphs/cba5667e-e3c6-44a4-811c-266dbc00e440.png differ diff --git a/static/graphs/cba78a1c-186f-4112-9e6a-be1839f030f7 b/static/graphs/cba78a1c-186f-4112-9e6a-be1839f030f7 new file mode 100644 index 0000000..b9affa9 --- /dev/null +++ b/static/graphs/cba78a1c-186f-4112-9e6a-be1839f030f7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=ROCKBOOT - S0112" [label="mitre-enterprise-attack-malware\nROCKBOOT - S0112",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ROCKBOOT - S0112" -> "mitre-enterprise-attack-attack-pattern=Bootkit - T1067" [label="uses",];} diff --git a/static/graphs/cba78a1c-186f-4112-9e6a-be1839f030f7.png b/static/graphs/cba78a1c-186f-4112-9e6a-be1839f030f7.png new file mode 100644 index 0000000..4e1a4e7 Binary files /dev/null and b/static/graphs/cba78a1c-186f-4112-9e6a-be1839f030f7.png differ diff --git a/static/graphs/cbf646f1-7db5-4dc6-808b-0094313949df b/static/graphs/cbf646f1-7db5-4dc6-808b-0094313949df new file mode 100644 index 0000000..159baef --- /dev/null +++ b/static/graphs/cbf646f1-7db5-4dc6-808b-0094313949df @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=CloudDuke - S0054" [label="mitre-enterprise-attack-malware\nCloudDuke - S0054",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CloudDuke - S0054" -> "mitre-enterprise-attack-attack-pattern=Web Service - T1102" [label="uses",];} diff --git a/static/graphs/cbf646f1-7db5-4dc6-808b-0094313949df.png b/static/graphs/cbf646f1-7db5-4dc6-808b-0094313949df.png new file mode 100644 index 0000000..28225d7 Binary files /dev/null and b/static/graphs/cbf646f1-7db5-4dc6-808b-0094313949df.png differ diff --git a/static/graphs/cc1432a1-6580-4338-b119-a43236528ea1 b/static/graphs/cc1432a1-6580-4338-b119-a43236528ea1 new file mode 100644 index 0000000..403ffd2 --- /dev/null +++ b/static/graphs/cc1432a1-6580-4338-b119-a43236528ea1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Virut" [label="botnet\nVirut",shape=box,style=filled,color=deepskyblue];"botnet=Virut" -> "malpedia=Virut" [label="similar",dir="both"];} diff --git a/static/graphs/cc1432a1-6580-4338-b119-a43236528ea1.png b/static/graphs/cc1432a1-6580-4338-b119-a43236528ea1.png new file mode 100644 index 0000000..91974c9 Binary files /dev/null and b/static/graphs/cc1432a1-6580-4338-b119-a43236528ea1.png differ diff --git a/static/graphs/ccd61dfc-b03f-4689-8c18-7c97eab08472 b/static/graphs/ccd61dfc-b03f-4689-8c18-7c97eab08472 new file mode 100644 index 0000000..a80de45 --- /dev/null +++ b/static/graphs/ccd61dfc-b03f-4689-8c18-7c97eab08472 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=CHOPSTICK - S0023" [label="mitre-enterprise-attack-malware\nCHOPSTICK - S0023",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CHOPSTICK - S0023" -> "mitre-mobile-attack-malware=X-Agent - MOB-S0030" [label="similar",dir="both"];"mitre-enterprise-attack-malware=CHOPSTICK - S0023" -> "tool=CHOPSTICK" [label="similar",dir="both"];"mitre-enterprise-attack-malware=CHOPSTICK - S0023" -> "tool=X-Agent" [label="similar",dir="both"];"mitre-enterprise-attack-malware=CHOPSTICK - S0023" -> "malpedia=X-Agent (Android)" [label="similar",dir="both"];"mitre-enterprise-attack-malware=CHOPSTICK - S0023" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="uses",];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" [label="mitre-mobile-attack-malware\nX-Agent - MOB-S0030",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" -> "mitre-mobile-attack-attack-pattern=Repackaged Application - MOB-T1047" [label="uses",];"mitre-mobile-attack-malware=X-Agent - MOB-S0030" -> "mitre-mobile-attack-attack-pattern=Location Tracking - MOB-T1033" [label="uses",];"tool=CHOPSTICK" [label="tool\nCHOPSTICK",shape=box,style=filled,color=deepskyblue];"tool=X-Agent" [label="tool\nX-Agent",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ccd61dfc-b03f-4689-8c18-7c97eab08472.png b/static/graphs/ccd61dfc-b03f-4689-8c18-7c97eab08472.png new file mode 100644 index 0000000..c1b7663 Binary files /dev/null and b/static/graphs/ccd61dfc-b03f-4689-8c18-7c97eab08472.png differ diff --git a/static/graphs/ccec8e6a-c316-485c-99f1-84e2ab0162e7 b/static/graphs/ccec8e6a-c316-485c-99f1-84e2ab0162e7 new file mode 100644 index 0000000..23d6d63 --- /dev/null +++ b/static/graphs/ccec8e6a-c316-485c-99f1-84e2ab0162e7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Availability:Denial of Service" [label="rsit\nAvailability:Denial of Service",shape=ellipse];} diff --git a/static/graphs/ccec8e6a-c316-485c-99f1-84e2ab0162e7.png b/static/graphs/ccec8e6a-c316-485c-99f1-84e2ab0162e7.png new file mode 100644 index 0000000..0d25dbd Binary files /dev/null and b/static/graphs/ccec8e6a-c316-485c-99f1-84e2ab0162e7.png differ diff --git a/static/graphs/cd1eb48e-070b-418e-8d83-4644a388f8ae b/static/graphs/cd1eb48e-070b-418e-8d83-4644a388f8ae new file mode 100644 index 0000000..b03b856 --- /dev/null +++ b/static/graphs/cd1eb48e-070b-418e-8d83-4644a388f8ae @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Roga" [label="ransomware\nRoga",shape=box,style=filled,color=deepskyblue];"ransomware=Roga" -> "ransomware=Free-Freedom" [label="similar",dir="both"];"ransomware=Free-Freedom" [label="ransomware\nFree-Freedom",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/cd1eb48e-070b-418e-8d83-4644a388f8ae.png b/static/graphs/cd1eb48e-070b-418e-8d83-4644a388f8ae.png new file mode 100644 index 0000000..27552b5 Binary files /dev/null and b/static/graphs/cd1eb48e-070b-418e-8d83-4644a388f8ae.png differ diff --git a/static/graphs/cd6527d1-17a7-4825-8b4b-56e113d0efb1 b/static/graphs/cd6527d1-17a7-4825-8b4b-56e113d0efb1 new file mode 100644 index 0000000..558e2dd --- /dev/null +++ b/static/graphs/cd6527d1-17a7-4825-8b4b-56e113d0efb1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=ARS VBS Loader" [label="rat\nARS VBS Loader",shape=box,style=filled,color=deepskyblue];"rat=ARS VBS Loader" -> "malpedia=ARS VBS Loader" [label="similar",dir="both"];} diff --git a/static/graphs/cd6527d1-17a7-4825-8b4b-56e113d0efb1.png b/static/graphs/cd6527d1-17a7-4825-8b4b-56e113d0efb1.png new file mode 100644 index 0000000..35537d2 Binary files /dev/null and b/static/graphs/cd6527d1-17a7-4825-8b4b-56e113d0efb1.png differ diff --git a/static/graphs/cd6c5f27-cf7e-4529-ae9c-ab5b85102bde b/static/graphs/cd6c5f27-cf7e-4529-ae9c-ab5b85102bde new file mode 100644 index 0000000..0713367 --- /dev/null +++ b/static/graphs/cd6c5f27-cf7e-4529-ae9c-ab5b85102bde @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Backspace" [label="tool\nBackspace",shape=box,style=filled,color=deepskyblue];"tool=Backspace" -> "mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="mitre-enterprise-attack-malware\nBACKSPACE - S0031",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Command and Control Channel - T1041" [label="uses",];} diff --git a/static/graphs/cd6c5f27-cf7e-4529-ae9c-ab5b85102bde.png b/static/graphs/cd6c5f27-cf7e-4529-ae9c-ab5b85102bde.png new file mode 100644 index 0000000..577c92a Binary files /dev/null and b/static/graphs/cd6c5f27-cf7e-4529-ae9c-ab5b85102bde.png differ diff --git a/static/graphs/cda7d605-23d0-4f93-a585-1276f094c04a b/static/graphs/cda7d605-23d0-4f93-a585-1276f094c04a new file mode 100644 index 0000000..06dccb2 --- /dev/null +++ b/static/graphs/cda7d605-23d0-4f93-a585-1276f094c04a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Taidoor" [label="tool\nTaidoor",shape=box,style=filled,color=deepskyblue];"tool=Taidoor" -> "mitre-enterprise-attack-malware=Taidoor - S0011" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Taidoor - S0011" [label="mitre-enterprise-attack-malware\nTaidoor - S0011",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Taidoor - S0011" -> "mitre-enterprise-attack-attack-pattern=Custom Cryptographic Protocol - T1024" [label="uses",];} diff --git a/static/graphs/cda7d605-23d0-4f93-a585-1276f094c04a.png b/static/graphs/cda7d605-23d0-4f93-a585-1276f094c04a.png new file mode 100644 index 0000000..f849fd9 Binary files /dev/null and b/static/graphs/cda7d605-23d0-4f93-a585-1276f094c04a.png differ diff --git a/static/graphs/cdcc59a0-955e-412d-b481-8dff4bce6fdf b/static/graphs/cdcc59a0-955e-412d-b481-8dff4bce6fdf new file mode 100644 index 0000000..2a22b05 --- /dev/null +++ b/static/graphs/cdcc59a0-955e-412d-b481-8dff4bce6fdf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=DirCrypt" [label="ransomware\nDirCrypt",shape=box,style=filled,color=deepskyblue];"ransomware=DirCrypt" -> "malpedia=DirCrypt" [label="similar",dir="both"];} diff --git a/static/graphs/cdcc59a0-955e-412d-b481-8dff4bce6fdf.png b/static/graphs/cdcc59a0-955e-412d-b481-8dff4bce6fdf.png new file mode 100644 index 0000000..60ee593 Binary files /dev/null and b/static/graphs/cdcc59a0-955e-412d-b481-8dff4bce6fdf.png differ diff --git a/static/graphs/cde2d700-9ed1-46cf-9bce-07364fe8b24f b/static/graphs/cde2d700-9ed1-46cf-9bce-07364fe8b24f new file mode 100644 index 0000000..ef9e340 --- /dev/null +++ b/static/graphs/cde2d700-9ed1-46cf-9bce-07364fe8b24f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Reg - S0075" [label="mitre-enterprise-attack-tool\nReg - S0075",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Reg - S0075" -> "mitre-enterprise-attack-attack-pattern=Credentials in Registry - T1214" [label="uses",];} diff --git a/static/graphs/cde2d700-9ed1-46cf-9bce-07364fe8b24f.png b/static/graphs/cde2d700-9ed1-46cf-9bce-07364fe8b24f.png new file mode 100644 index 0000000..8efb0cc Binary files /dev/null and b/static/graphs/cde2d700-9ed1-46cf-9bce-07364fe8b24f.png differ diff --git a/static/graphs/cdecc44a-1dbf-4c1f-881c-f21e3f47272a b/static/graphs/cdecc44a-1dbf-4c1f-881c-f21e3f47272a new file mode 100644 index 0000000..dd8d50b --- /dev/null +++ b/static/graphs/cdecc44a-1dbf-4c1f-881c-f21e3f47272a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Remote File Copy Mitigation - T1105" [label="mitre-enterprise-attack-course-of-action\nRemote File Copy Mitigation - T1105",shape=ellipse];"mitre-enterprise-attack-course-of-action=Remote File Copy Mitigation - T1105" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="mitigates",];} diff --git a/static/graphs/cdecc44a-1dbf-4c1f-881c-f21e3f47272a.png b/static/graphs/cdecc44a-1dbf-4c1f-881c-f21e3f47272a.png new file mode 100644 index 0000000..1dabe71 Binary files /dev/null and b/static/graphs/cdecc44a-1dbf-4c1f-881c-f21e3f47272a.png differ diff --git a/static/graphs/cdf1148c-5358-11e8-87e5-ab60d455597f b/static/graphs/cdf1148c-5358-11e8-87e5-ab60d455597f new file mode 100644 index 0000000..bb5520e --- /dev/null +++ b/static/graphs/cdf1148c-5358-11e8-87e5-ab60d455597f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Hide and Seek" [label="botnet\nHide and Seek",shape=box,style=filled,color=deepskyblue];"botnet=Hide and Seek" -> "malpedia=Hide and Seek" [label="similar",dir="both"];} diff --git a/static/graphs/cdf1148c-5358-11e8-87e5-ab60d455597f.png b/static/graphs/cdf1148c-5358-11e8-87e5-ab60d455597f.png new file mode 100644 index 0000000..87fd9e3 Binary files /dev/null and b/static/graphs/cdf1148c-5358-11e8-87e5-ab60d455597f.png differ diff --git a/static/graphs/ce1a9641-5bb8-4a61-990a-870e9ef36ac1 b/static/graphs/ce1a9641-5bb8-4a61-990a-870e9ef36ac1 new file mode 100644 index 0000000..34a4c4c --- /dev/null +++ b/static/graphs/ce1a9641-5bb8-4a61-990a-870e9ef36ac1 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=Adwind" [label="android\nAdwind",shape=box,style=filled,color=deepskyblue];"android=Adwind" -> "rat=Adwind RAT" [label="similar",dir="both"];"android=Adwind" -> "tool=Adwind" [label="similar",dir="both"];"android=Adwind" -> "android=Sockrat" [label="similar",dir="both"];"android=Adwind" -> "malpedia=AdWind" [label="similar",dir="both"];"android=Sockrat" [label="android\nSockrat",shape=box,style=filled,color=deepskyblue];"rat=Adwind RAT" [label="rat\nAdwind RAT",shape=box,style=filled,color=deepskyblue];"tool=Adwind" [label="tool\nAdwind",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ce1a9641-5bb8-4a61-990a-870e9ef36ac1.png b/static/graphs/ce1a9641-5bb8-4a61-990a-870e9ef36ac1.png new file mode 100644 index 0000000..e3d522a Binary files /dev/null and b/static/graphs/ce1a9641-5bb8-4a61-990a-870e9ef36ac1.png differ diff --git a/static/graphs/cf23bf4a-e003-4116-bbae-1ea6c558d565 b/static/graphs/cf23bf4a-e003-4116-bbae-1ea6c558d565 new file mode 100644 index 0000000..2c6ba04 --- /dev/null +++ b/static/graphs/cf23bf4a-e003-4116-bbae-1ea6c558d565 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=FTP - S0095" [label="mitre-enterprise-attack-tool\nFTP - S0095",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=FTP - S0095" -> "mitre-enterprise-attack-attack-pattern=Commonly Used Port - T1043" [label="uses",];} diff --git a/static/graphs/cf23bf4a-e003-4116-bbae-1ea6c558d565.png b/static/graphs/cf23bf4a-e003-4116-bbae-1ea6c558d565.png new file mode 100644 index 0000000..e033f8e Binary files /dev/null and b/static/graphs/cf23bf4a-e003-4116-bbae-1ea6c558d565.png differ diff --git a/static/graphs/cf2cccb1-cab8-431a-8ecf-f7874d05f433 b/static/graphs/cf2cccb1-cab8-431a-8ecf-f7874d05f433 new file mode 100644 index 0000000..1c59a28 --- /dev/null +++ b/static/graphs/cf2cccb1-cab8-431a-8ecf-f7874d05f433 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=Deploy Compromised Device Detection Method - MOB-M1010" [label="mitre-mobile-attack-course-of-action\nDeploy Compromised Device Detection Method - MOB-M1010",shape=ellipse];"mitre-mobile-attack-course-of-action=Deploy Compromised Device Detection Method - MOB-M1010" -> "mitre-mobile-attack-attack-pattern=Lock User Out of Device - MOB-T1049" [label="mitigates",];} diff --git a/static/graphs/cf2cccb1-cab8-431a-8ecf-f7874d05f433.png b/static/graphs/cf2cccb1-cab8-431a-8ecf-f7874d05f433.png new file mode 100644 index 0000000..281ee18 Binary files /dev/null and b/static/graphs/cf2cccb1-cab8-431a-8ecf-f7874d05f433.png differ diff --git a/static/graphs/cfc2d2fc-14ff-495f-bd99-585be47b804f b/static/graphs/cfc2d2fc-14ff-495f-bd99-585be47b804f new file mode 100644 index 0000000..1b8c1ae --- /dev/null +++ b/static/graphs/cfc2d2fc-14ff-495f-bd99-585be47b804f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Application Shimming Mitigation - T1138" [label="mitre-enterprise-attack-course-of-action\nApplication Shimming Mitigation - T1138",shape=ellipse];"mitre-enterprise-attack-course-of-action=Application Shimming Mitigation - T1138" -> "mitre-enterprise-attack-attack-pattern=Application Shimming - T1138" [label="mitigates",];} diff --git a/static/graphs/cfc2d2fc-14ff-495f-bd99-585be47b804f.png b/static/graphs/cfc2d2fc-14ff-495f-bd99-585be47b804f.png new file mode 100644 index 0000000..fb18276 Binary files /dev/null and b/static/graphs/cfc2d2fc-14ff-495f-bd99-585be47b804f.png differ diff --git a/static/graphs/cfd2cd3b-93e7-4b3e-ab46-f8bcafdbdfcf b/static/graphs/cfd2cd3b-93e7-4b3e-ab46-f8bcafdbdfcf new file mode 100644 index 0000000..c3271d4 --- /dev/null +++ b/static/graphs/cfd2cd3b-93e7-4b3e-ab46-f8bcafdbdfcf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Execution through Module Load Mitigation - T1129" [label="mitre-enterprise-attack-course-of-action\nExecution through Module Load Mitigation - T1129",shape=ellipse];"mitre-enterprise-attack-course-of-action=Execution through Module Load Mitigation - T1129" -> "mitre-enterprise-attack-attack-pattern=Execution through Module Load - T1129" [label="mitigates",];} diff --git a/static/graphs/cfd2cd3b-93e7-4b3e-ab46-f8bcafdbdfcf.png b/static/graphs/cfd2cd3b-93e7-4b3e-ab46-f8bcafdbdfcf.png new file mode 100644 index 0000000..927a77b Binary files /dev/null and b/static/graphs/cfd2cd3b-93e7-4b3e-ab46-f8bcafdbdfcf.png differ diff --git a/static/graphs/d01f473f-3cdc-4867-9e55-1de9cf1986f0 b/static/graphs/d01f473f-3cdc-4867-9e55-1de9cf1986f0 new file mode 100644 index 0000000..ed40293 --- /dev/null +++ b/static/graphs/d01f473f-3cdc-4867-9e55-1de9cf1986f0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Deobfuscate/Decode Files or Information Mitigation - T1140" [label="mitre-enterprise-attack-course-of-action\nDeobfuscate/Decode Files or Information Mitigation - T1140",shape=ellipse];"mitre-enterprise-attack-course-of-action=Deobfuscate/Decode Files or Information Mitigation - T1140" -> "mitre-enterprise-attack-attack-pattern=Deobfuscate/Decode Files or Information - T1140" [label="mitigates",];} diff --git a/static/graphs/d01f473f-3cdc-4867-9e55-1de9cf1986f0.png b/static/graphs/d01f473f-3cdc-4867-9e55-1de9cf1986f0.png new file mode 100644 index 0000000..43c7b1f Binary files /dev/null and b/static/graphs/d01f473f-3cdc-4867-9e55-1de9cf1986f0.png differ diff --git a/static/graphs/d0415180-51e9-40ce-b57c-c332b0b441f2 b/static/graphs/d0415180-51e9-40ce-b57c-c332b0b441f2 new file mode 100644 index 0000000..61c2d99 --- /dev/null +++ b/static/graphs/d0415180-51e9-40ce-b57c-c332b0b441f2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=PowerShell Mitigation - T1086" [label="mitre-enterprise-attack-course-of-action\nPowerShell Mitigation - T1086",shape=ellipse];"mitre-enterprise-attack-course-of-action=PowerShell Mitigation - T1086" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="mitigates",];} diff --git a/static/graphs/d0415180-51e9-40ce-b57c-c332b0b441f2.png b/static/graphs/d0415180-51e9-40ce-b57c-c332b0b441f2.png new file mode 100644 index 0000000..c5a898a Binary files /dev/null and b/static/graphs/d0415180-51e9-40ce-b57c-c332b0b441f2.png differ diff --git a/static/graphs/d05f7357-4cbe-47ea-bf83-b8604226d533 b/static/graphs/d05f7357-4cbe-47ea-bf83-b8604226d533 new file mode 100644 index 0000000..4c9b72e --- /dev/null +++ b/static/graphs/d05f7357-4cbe-47ea-bf83-b8604226d533 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=Android/Chuli.A - MOB-S0020" [label="mitre-mobile-attack-malware\nAndroid/Chuli.A - MOB-S0020",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Android/Chuli.A - MOB-S0020" -> "mitre-mobile-attack-attack-pattern=App Delivered via Email Attachment - MOB-T1037" [label="uses",];"mitre-mobile-attack-attack-pattern=App Delivered via Email Attachment - MOB-T1037" [label="mitre-mobile-attack-attack-pattern\nApp Delivered via Email Attachment - MOB-T1037",shape=ellipse];} diff --git a/static/graphs/d05f7357-4cbe-47ea-bf83-b8604226d533.png b/static/graphs/d05f7357-4cbe-47ea-bf83-b8604226d533.png new file mode 100644 index 0000000..c962f24 Binary files /dev/null and b/static/graphs/d05f7357-4cbe-47ea-bf83-b8604226d533.png differ diff --git a/static/graphs/d0fcf37a-b6c4-4745-9c43-4fcdb8bfc88e b/static/graphs/d0fcf37a-b6c4-4745-9c43-4fcdb8bfc88e new file mode 100644 index 0000000..a190f42 --- /dev/null +++ b/static/graphs/d0fcf37a-b6c4-4745-9c43-4fcdb8bfc88e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Data Obfuscation Mitigation - T1001" [label="mitre-enterprise-attack-course-of-action\nData Obfuscation Mitigation - T1001",shape=ellipse];"mitre-enterprise-attack-course-of-action=Data Obfuscation Mitigation - T1001" -> "mitre-enterprise-attack-attack-pattern=Data Obfuscation - T1001" [label="mitigates",];} diff --git a/static/graphs/d0fcf37a-b6c4-4745-9c43-4fcdb8bfc88e.png b/static/graphs/d0fcf37a-b6c4-4745-9c43-4fcdb8bfc88e.png new file mode 100644 index 0000000..3aa96aa Binary files /dev/null and b/static/graphs/d0fcf37a-b6c4-4745-9c43-4fcdb8bfc88e.png differ diff --git a/static/graphs/d10f8cd5-0077-4d8f-9145-03815a68dd33 b/static/graphs/d10f8cd5-0077-4d8f-9145-03815a68dd33 new file mode 100644 index 0000000..956b930 --- /dev/null +++ b/static/graphs/d10f8cd5-0077-4d8f-9145-03815a68dd33 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=RedAlert2" [label="android\nRedAlert2",shape=box,style=filled,color=deepskyblue];"android=RedAlert2" -> "malpedia=RedAlert2" [label="similar",dir="both"];} diff --git a/static/graphs/d10f8cd5-0077-4d8f-9145-03815a68dd33.png b/static/graphs/d10f8cd5-0077-4d8f-9145-03815a68dd33.png new file mode 100644 index 0000000..422ab18 Binary files /dev/null and b/static/graphs/d10f8cd5-0077-4d8f-9145-03815a68dd33.png differ diff --git a/static/graphs/d144c83e-2302-4947-9e24-856fbf7949ae b/static/graphs/d144c83e-2302-4947-9e24-856fbf7949ae new file mode 100644 index 0000000..738a47e --- /dev/null +++ b/static/graphs/d144c83e-2302-4947-9e24-856fbf7949ae @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=UPS" [label="threat-actor\nUPS",shape=octagon,style=filled,color=indianred1];"threat-actor=UPS" -> "mitre-enterprise-attack-intrusion-set=APT3 - G0022" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT3 - G0022" [label="mitre-enterprise-attack-intrusion-set\nAPT3 - G0022",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT3 - G0022" -> "mitre-enterprise-attack-malware=PlugX - S0013" [label="uses",];"mitre-enterprise-attack-malware=PlugX - S0013" [label="mitre-enterprise-attack-malware\nPlugX - S0013",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PlugX - S0013" -> "rat=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "tool=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "malpedia=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" -> "mitre-enterprise-attack-attack-pattern=Query Registry - T1012" [label="uses",];"rat=PlugX" [label="rat\nPlugX",shape=box,style=filled,color=deepskyblue];"tool=PlugX" [label="tool\nPlugX",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/d144c83e-2302-4947-9e24-856fbf7949ae.png b/static/graphs/d144c83e-2302-4947-9e24-856fbf7949ae.png new file mode 100644 index 0000000..1f63b47 Binary files /dev/null and b/static/graphs/d144c83e-2302-4947-9e24-856fbf7949ae.png differ diff --git a/static/graphs/d1482c9e-6af3-11e8-aa8e-279274bd10c7 b/static/graphs/d1482c9e-6af3-11e8-aa8e-279274bd10c7 new file mode 100644 index 0000000..24e3706 --- /dev/null +++ b/static/graphs/d1482c9e-6af3-11e8-aa8e-279274bd10c7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=PLEAD" [label="tool\nPLEAD",shape=box,style=filled,color=deepskyblue];"tool=PLEAD" -> "malpedia=PLEAD (Windows)" [label="similar",dir="both"];"tool=PLEAD" -> "tool=TSCookie" [label="similar",dir="both"];"tool=TSCookie" [label="tool\nTSCookie",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/d1482c9e-6af3-11e8-aa8e-279274bd10c7.png b/static/graphs/d1482c9e-6af3-11e8-aa8e-279274bd10c7.png new file mode 100644 index 0000000..e65c353 Binary files /dev/null and b/static/graphs/d1482c9e-6af3-11e8-aa8e-279274bd10c7.png differ diff --git a/static/graphs/d1acfbb3-647b-4723-9154-800ec119006e b/static/graphs/d1acfbb3-647b-4723-9154-800ec119006e new file mode 100644 index 0000000..8ef2b4e --- /dev/null +++ b/static/graphs/d1acfbb3-647b-4723-9154-800ec119006e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Sowbug - G0054" [label="mitre-enterprise-attack-intrusion-set\nSowbug - G0054",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Sowbug - G0054" -> "threat-actor=Sowbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Sowbug - G0054" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];"threat-actor=Sowbug" [label="threat-actor\nSowbug",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/d1acfbb3-647b-4723-9154-800ec119006e.png b/static/graphs/d1acfbb3-647b-4723-9154-800ec119006e.png new file mode 100644 index 0000000..bd08b46 Binary files /dev/null and b/static/graphs/d1acfbb3-647b-4723-9154-800ec119006e.png differ diff --git a/static/graphs/d1c600f8-0fb6-4367-921b-85b71947d950 b/static/graphs/d1c600f8-0fb6-4367-921b-85b71947d950 new file mode 100644 index 0000000..201eb00 --- /dev/null +++ b/static/graphs/d1c600f8-0fb6-4367-921b-85b71947d950 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=Charger - MOB-S0039" [label="mitre-mobile-attack-malware\nCharger - MOB-S0039",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Charger - MOB-S0039" -> "malpedia=Charger" [label="similar",dir="both"];"mitre-mobile-attack-malware=Charger - MOB-S0039" -> "mitre-mobile-attack-attack-pattern=Access Contact List - MOB-T1035" [label="uses",];"mitre-mobile-attack-malware=Charger - MOB-S0039" -> "mitre-mobile-attack-attack-pattern=Location Tracking - MOB-T1033" [label="uses",];} diff --git a/static/graphs/d1c600f8-0fb6-4367-921b-85b71947d950.png b/static/graphs/d1c600f8-0fb6-4367-921b-85b71947d950.png new file mode 100644 index 0000000..beb5d4b Binary files /dev/null and b/static/graphs/d1c600f8-0fb6-4367-921b-85b71947d950.png differ diff --git a/static/graphs/d1e548b8-4793-11e8-8dea-6beff82cac0a b/static/graphs/d1e548b8-4793-11e8-8dea-6beff82cac0a new file mode 100644 index 0000000..de7f16d --- /dev/null +++ b/static/graphs/d1e548b8-4793-11e8-8dea-6beff82cac0a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Kwampirs" [label="tool\nKwampirs",shape=box,style=filled,color=deepskyblue];"tool=Kwampirs" -> "malpedia=Kwampirs" [label="similar",dir="both"];} diff --git a/static/graphs/d1e548b8-4793-11e8-8dea-6beff82cac0a.png b/static/graphs/d1e548b8-4793-11e8-8dea-6beff82cac0a.png new file mode 100644 index 0000000..f1e7a53 Binary files /dev/null and b/static/graphs/d1e548b8-4793-11e8-8dea-6beff82cac0a.png differ diff --git a/static/graphs/d22a3e65-75e5-4970-b424-bdc06ec33dba b/static/graphs/d22a3e65-75e5-4970-b424-bdc06ec33dba new file mode 100644 index 0000000..97178f5 --- /dev/null +++ b/static/graphs/d22a3e65-75e5-4970-b424-bdc06ec33dba @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Hi-Zor" [label="rat\nHi-Zor",shape=box,style=filled,color=deepskyblue];"rat=Hi-Zor" -> "mitre-enterprise-attack-malware=Hi-Zor - S0087" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Hi-Zor - S0087" [label="mitre-enterprise-attack-malware\nHi-Zor - S0087",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Hi-Zor - S0087" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/d22a3e65-75e5-4970-b424-bdc06ec33dba.png b/static/graphs/d22a3e65-75e5-4970-b424-bdc06ec33dba.png new file mode 100644 index 0000000..d8893d0 Binary files /dev/null and b/static/graphs/d22a3e65-75e5-4970-b424-bdc06ec33dba.png differ diff --git a/static/graphs/d256cb63-b021-4b4a-bb6d-1b42eea179a3 b/static/graphs/d256cb63-b021-4b4a-bb6d-1b42eea179a3 new file mode 100644 index 0000000..a887781 --- /dev/null +++ b/static/graphs/d256cb63-b021-4b4a-bb6d-1b42eea179a3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Network Service Scanning Mitigation - T1046" [label="mitre-enterprise-attack-course-of-action\nNetwork Service Scanning Mitigation - T1046",shape=ellipse];"mitre-enterprise-attack-course-of-action=Network Service Scanning Mitigation - T1046" -> "mitre-enterprise-attack-attack-pattern=Network Service Scanning - T1046" [label="mitigates",];} diff --git a/static/graphs/d256cb63-b021-4b4a-bb6d-1b42eea179a3.png b/static/graphs/d256cb63-b021-4b4a-bb6d-1b42eea179a3.png new file mode 100644 index 0000000..5478117 Binary files /dev/null and b/static/graphs/d256cb63-b021-4b4a-bb6d-1b42eea179a3.png differ diff --git a/static/graphs/d2a199d2-dfea-4d0c-987d-6195ed17be9c b/static/graphs/d2a199d2-dfea-4d0c-987d-6195ed17be9c new file mode 100644 index 0000000..2f2470b --- /dev/null +++ b/static/graphs/d2a199d2-dfea-4d0c-987d-6195ed17be9c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=Use Device-Provided Credential Storage - MOB-M1008" [label="mitre-mobile-attack-course-of-action\nUse Device-Provided Credential Storage - MOB-M1008",shape=ellipse];"mitre-mobile-attack-course-of-action=Use Device-Provided Credential Storage - MOB-M1008" -> "mitre-mobile-attack-attack-pattern=Access Sensitive Data or Credentials in Files - MOB-T1012" [label="mitigates",];} diff --git a/static/graphs/d2a199d2-dfea-4d0c-987d-6195ed17be9c.png b/static/graphs/d2a199d2-dfea-4d0c-987d-6195ed17be9c.png new file mode 100644 index 0000000..228799b Binary files /dev/null and b/static/graphs/d2a199d2-dfea-4d0c-987d-6195ed17be9c.png differ diff --git a/static/graphs/d2dce10b-3562-4d61-b2f5-7c6384b038e2 b/static/graphs/d2dce10b-3562-4d61-b2f5-7c6384b038e2 new file mode 100644 index 0000000..905d38e --- /dev/null +++ b/static/graphs/d2dce10b-3562-4d61-b2f5-7c6384b038e2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Mshta Mitigation - T1170" [label="mitre-enterprise-attack-course-of-action\nMshta Mitigation - T1170",shape=ellipse];"mitre-enterprise-attack-course-of-action=Mshta Mitigation - T1170" -> "mitre-enterprise-attack-attack-pattern=Mshta - T1170" [label="mitigates",];} diff --git a/static/graphs/d2dce10b-3562-4d61-b2f5-7c6384b038e2.png b/static/graphs/d2dce10b-3562-4d61-b2f5-7c6384b038e2.png new file mode 100644 index 0000000..c1d6d9a Binary files /dev/null and b/static/graphs/d2dce10b-3562-4d61-b2f5-7c6384b038e2.png differ diff --git a/static/graphs/d3337bec-fd4e-11e8-a3ad-e799cc59c59c b/static/graphs/d3337bec-fd4e-11e8-a3ad-e799cc59c59c new file mode 100644 index 0000000..bf5e521 --- /dev/null +++ b/static/graphs/d3337bec-fd4e-11e8-a3ad-e799cc59c59c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Dablio Ransomware" [label="ransomware\nDablio Ransomware",shape=box,style=filled,color=deepskyblue];"ransomware=Dablio Ransomware" -> "ransomware=HolyCrypt" [label="similar",dir="both"];"ransomware=HolyCrypt" [label="ransomware\nHolyCrypt",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/d3337bec-fd4e-11e8-a3ad-e799cc59c59c.png b/static/graphs/d3337bec-fd4e-11e8-a3ad-e799cc59c59c.png new file mode 100644 index 0000000..ce410a0 Binary files /dev/null and b/static/graphs/d3337bec-fd4e-11e8-a3ad-e799cc59c59c.png differ diff --git a/static/graphs/d357a6ff-00e5-4fcc-8b9e-4a9d98a736e7 b/static/graphs/d357a6ff-00e5-4fcc-8b9e-4a9d98a736e7 new file mode 100644 index 0000000..ddf5c78 --- /dev/null +++ b/static/graphs/d357a6ff-00e5-4fcc-8b9e-4a9d98a736e7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=RDAT" [label="tool\nRDAT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/d357a6ff-00e5-4fcc-8b9e-4a9d98a736e7.png b/static/graphs/d357a6ff-00e5-4fcc-8b9e-4a9d98a736e7.png new file mode 100644 index 0000000..7ea7a94 Binary files /dev/null and b/static/graphs/d357a6ff-00e5-4fcc-8b9e-4a9d98a736e7.png differ diff --git a/static/graphs/d36f4834-b958-4f32-aff0-5263e0034408 b/static/graphs/d36f4834-b958-4f32-aff0-5263e0034408 new file mode 100644 index 0000000..646271e --- /dev/null +++ b/static/graphs/d36f4834-b958-4f32-aff0-5263e0034408 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Nymaim" [label="tool\nNymaim",shape=box,style=filled,color=deepskyblue];"tool=Nymaim" -> "malpedia=Nymaim" [label="similar",dir="both"];} diff --git a/static/graphs/d36f4834-b958-4f32-aff0-5263e0034408.png b/static/graphs/d36f4834-b958-4f32-aff0-5263e0034408.png new file mode 100644 index 0000000..03d3057 Binary files /dev/null and b/static/graphs/d36f4834-b958-4f32-aff0-5263e0034408.png differ diff --git a/static/graphs/d3afa961-a80c-4043-9509-282cdf69ab21 b/static/graphs/d3afa961-a80c-4043-9509-282cdf69ab21 new file mode 100644 index 0000000..02bb7ed --- /dev/null +++ b/static/graphs/d3afa961-a80c-4043-9509-282cdf69ab21 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Winnti - S0141" [label="mitre-enterprise-attack-malware\nWinnti - S0141",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Winnti - S0141" -> "tool=Winnti" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Winnti - S0141" -> "malpedia=Winnti (Windows)" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Winnti - S0141" -> "mitre-enterprise-attack-attack-pattern=Masquerading - T1036" [label="uses",];"tool=Winnti" [label="tool\nWinnti",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/d3afa961-a80c-4043-9509-282cdf69ab21.png b/static/graphs/d3afa961-a80c-4043-9509-282cdf69ab21.png new file mode 100644 index 0000000..787d49f Binary files /dev/null and b/static/graphs/d3afa961-a80c-4043-9509-282cdf69ab21.png differ diff --git a/static/graphs/d3d56dd0-3409-470a-958b-a865fdd158f9 b/static/graphs/d3d56dd0-3409-470a-958b-a865fdd158f9 new file mode 100644 index 0000000..0c367f6 --- /dev/null +++ b/static/graphs/d3d56dd0-3409-470a-958b-a865fdd158f9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Mad Max" [label="tool\nMad Max",shape=box,style=filled,color=deepskyblue];"tool=Mad Max" -> "botnet=Madmax" [label="similar",dir="both"];"botnet=Madmax" [label="botnet\nMadmax",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/d3d56dd0-3409-470a-958b-a865fdd158f9.png b/static/graphs/d3d56dd0-3409-470a-958b-a865fdd158f9.png new file mode 100644 index 0000000..9820a90 Binary files /dev/null and b/static/graphs/d3d56dd0-3409-470a-958b-a865fdd158f9.png differ diff --git a/static/graphs/d45f03a8-790a-4f90-b956-cd7e5b8886bf b/static/graphs/d45f03a8-790a-4f90-b956-cd7e5b8886bf new file mode 100644 index 0000000..6ee8d9d --- /dev/null +++ b/static/graphs/d45f03a8-790a-4f90-b956-cd7e5b8886bf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Valid Accounts Mitigation - T1078" [label="mitre-enterprise-attack-course-of-action\nValid Accounts Mitigation - T1078",shape=ellipse];"mitre-enterprise-attack-course-of-action=Valid Accounts Mitigation - T1078" -> "mitre-enterprise-attack-attack-pattern=Valid Accounts - T1078" [label="mitigates",];} diff --git a/static/graphs/d45f03a8-790a-4f90-b956-cd7e5b8886bf.png b/static/graphs/d45f03a8-790a-4f90-b956-cd7e5b8886bf.png new file mode 100644 index 0000000..ad19a32 Binary files /dev/null and b/static/graphs/d45f03a8-790a-4f90-b956-cd7e5b8886bf.png differ diff --git a/static/graphs/d4fd04e0-d1a4-4b5a-a5bb-16683cdbcce2 b/static/graphs/d4fd04e0-d1a4-4b5a-a5bb-16683cdbcce2 new file mode 100644 index 0000000..e743336 --- /dev/null +++ b/static/graphs/d4fd04e0-d1a4-4b5a-a5bb-16683cdbcce2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=External Remote Services Mitigation - T1133" [label="mitre-enterprise-attack-course-of-action\nExternal Remote Services Mitigation - T1133",shape=ellipse];"mitre-enterprise-attack-course-of-action=External Remote Services Mitigation - T1133" -> "mitre-enterprise-attack-attack-pattern=External Remote Services - T1133" [label="mitigates",];} diff --git a/static/graphs/d4fd04e0-d1a4-4b5a-a5bb-16683cdbcce2.png b/static/graphs/d4fd04e0-d1a4-4b5a-a5bb-16683cdbcce2.png new file mode 100644 index 0000000..87a6779 Binary files /dev/null and b/static/graphs/d4fd04e0-d1a4-4b5a-a5bb-16683cdbcce2.png differ diff --git a/static/graphs/d519164e-f5fa-4b8c-a1fb-cf0172ad0983 b/static/graphs/d519164e-f5fa-4b8c-a1fb-cf0172ad0983 new file mode 100644 index 0000000..5f22ea7 --- /dev/null +++ b/static/graphs/d519164e-f5fa-4b8c-a1fb-cf0172ad0983 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Threat Group-1314 - G0028" [label="mitre-enterprise-attack-intrusion-set\nThreat Group-1314 - G0028",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Threat Group-1314 - G0028" -> "mitre-enterprise-attack-attack-pattern=Third-party Software - T1072" [label="uses",];} diff --git a/static/graphs/d519164e-f5fa-4b8c-a1fb-cf0172ad0983.png b/static/graphs/d519164e-f5fa-4b8c-a1fb-cf0172ad0983.png new file mode 100644 index 0000000..dba6f19 Binary files /dev/null and b/static/graphs/d519164e-f5fa-4b8c-a1fb-cf0172ad0983.png differ diff --git a/static/graphs/d52ca4c4-d214-11e8-8d29-c3e7cb78acce b/static/graphs/d52ca4c4-d214-11e8-8d29-c3e7cb78acce new file mode 100644 index 0000000..2ed17d7 --- /dev/null +++ b/static/graphs/d52ca4c4-d214-11e8-8d29-c3e7cb78acce @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=GreyEnergy" [label="threat-actor\nGreyEnergy",shape=octagon,style=filled,color=indianred1];"threat-actor=GreyEnergy" -> "threat-actor=Sandworm" [label="similar",dir="both"];"threat-actor=Sandworm" [label="threat-actor\nSandworm",shape=octagon,style=filled,color=indianred1];"threat-actor=Sandworm" -> "mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" [label="similar",dir="both"];"threat-actor=Sandworm" -> "threat-actor=TeleBots" [label="similar",dir="both"];"threat-actor=Sandworm" -> "threat-actor=ELECTRUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" [label="mitre-enterprise-attack-intrusion-set\nSandworm Team - G0034",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" -> "mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="uses",];"threat-actor=TeleBots" [label="threat-actor\nTeleBots",shape=octagon,style=filled,color=indianred1];"threat-actor=ELECTRUM" [label="threat-actor\nELECTRUM",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="mitre-enterprise-attack-malware\nBlackEnergy - S0089",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "tool=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "malpedia=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];"tool=BlackEnergy" [label="tool\nBlackEnergy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/d52ca4c4-d214-11e8-8d29-c3e7cb78acce.png b/static/graphs/d52ca4c4-d214-11e8-8d29-c3e7cb78acce.png new file mode 100644 index 0000000..7df3d4c Binary files /dev/null and b/static/graphs/d52ca4c4-d214-11e8-8d29-c3e7cb78acce.png differ diff --git a/static/graphs/d530ea76-9bbc-4276-a2e3-df04e0e5a14c b/static/graphs/d530ea76-9bbc-4276-a2e3-df04e0e5a14c new file mode 100644 index 0000000..393d928 --- /dev/null +++ b/static/graphs/d530ea76-9bbc-4276-a2e3-df04e0e5a14c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Bagle" [label="botnet\nBagle",shape=box,style=filled,color=deepskyblue];"botnet=Bagle" -> "malpedia=Bagle" [label="similar",dir="both"];} diff --git a/static/graphs/d530ea76-9bbc-4276-a2e3-df04e0e5a14c.png b/static/graphs/d530ea76-9bbc-4276-a2e3-df04e0e5a14c.png new file mode 100644 index 0000000..14f3b3e Binary files /dev/null and b/static/graphs/d530ea76-9bbc-4276-a2e3-df04e0e5a14c.png differ diff --git a/static/graphs/d56c99fa-4710-472c-81a6-41b7a84ea4be b/static/graphs/d56c99fa-4710-472c-81a6-41b7a84ea4be new file mode 100644 index 0000000..82bd53a --- /dev/null +++ b/static/graphs/d56c99fa-4710-472c-81a6-41b7a84ea4be @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Clever Kitten" -> "mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="similar",dir="both"];"threat-actor=Clever Kitten" -> "threat-actor=Cutting Kitten" [label="similar",dir="both"];"threat-actor=Clever Kitten" -> "threat-actor=Cleaver" [label="similar",dir="both"];"threat-actor=Clever Kitten" -> "threat-actor=OilRig" [label="similar",dir="both"];"threat-actor=Clever Kitten" -> "threat-actor=CHRYSENE" [label="similar",dir="both"];"threat-actor=Clever Kitten" -> "mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="similar",dir="both"];"threat-actor=Clever Kitten" -> "threat-actor=Flying Kitten" [label="similar",dir="both"];"threat-actor=Clever Kitten" -> "threat-actor=Charming Kitten" [label="similar",dir="both"];"threat-actor=Clever Kitten" -> "threat-actor=Rocket Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="similar",dir="both"];"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "threat-actor=Greenbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/d56c99fa-4710-472c-81a6-41b7a84ea4be.png b/static/graphs/d56c99fa-4710-472c-81a6-41b7a84ea4be.png new file mode 100644 index 0000000..1808840 Binary files /dev/null and b/static/graphs/d56c99fa-4710-472c-81a6-41b7a84ea4be.png differ diff --git a/static/graphs/d5d3f9de-21b5-482e-b716-5f2f13182990 b/static/graphs/d5d3f9de-21b5-482e-b716-5f2f13182990 new file mode 100644 index 0000000..09e85b8 --- /dev/null +++ b/static/graphs/d5d3f9de-21b5-482e-b716-5f2f13182990 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Apocalypse" [label="rat\nApocalypse",shape=box,style=filled,color=deepskyblue];"rat=Apocalypse" -> "ransomware=Apocalypse" [label="similar",dir="both"];"rat=Apocalypse" -> "malpedia=Apocalypse" [label="similar",dir="both"];"ransomware=Apocalypse" [label="ransomware\nApocalypse",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/d5d3f9de-21b5-482e-b716-5f2f13182990.png b/static/graphs/d5d3f9de-21b5-482e-b716-5f2f13182990.png new file mode 100644 index 0000000..c729173 Binary files /dev/null and b/static/graphs/d5d3f9de-21b5-482e-b716-5f2f13182990.png differ diff --git a/static/graphs/d5dce4b9-f1fa-4c03-aff9-ce177246cb64 b/static/graphs/d5dce4b9-f1fa-4c03-aff9-ce177246cb64 new file mode 100644 index 0000000..31e58ec --- /dev/null +++ b/static/graphs/d5dce4b9-f1fa-4c03-aff9-ce177246cb64 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Service Execution Mitigation - T1035" [label="mitre-enterprise-attack-course-of-action\nService Execution Mitigation - T1035",shape=ellipse];"mitre-enterprise-attack-course-of-action=Service Execution Mitigation - T1035" -> "mitre-enterprise-attack-attack-pattern=Service Execution - T1035" [label="mitigates",];} diff --git a/static/graphs/d5dce4b9-f1fa-4c03-aff9-ce177246cb64.png b/static/graphs/d5dce4b9-f1fa-4c03-aff9-ce177246cb64.png new file mode 100644 index 0000000..17dc07b Binary files /dev/null and b/static/graphs/d5dce4b9-f1fa-4c03-aff9-ce177246cb64.png differ diff --git a/static/graphs/d5e96a35-7b0b-4c6a-9533-d63ecbda563e b/static/graphs/d5e96a35-7b0b-4c6a-9533-d63ecbda563e new file mode 100644 index 0000000..3440ec6 --- /dev/null +++ b/static/graphs/d5e96a35-7b0b-4c6a-9533-d63ecbda563e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=HTRAN - S0040" [label="mitre-enterprise-attack-tool\nHTRAN - S0040",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=HTRAN - S0040" -> "malpedia=HTran" [label="similar",dir="both"];"mitre-enterprise-attack-tool=HTRAN - S0040" -> "mitre-enterprise-attack-attack-pattern=Connection Proxy - T1090" [label="uses",];} diff --git a/static/graphs/d5e96a35-7b0b-4c6a-9533-d63ecbda563e.png b/static/graphs/d5e96a35-7b0b-4c6a-9533-d63ecbda563e.png new file mode 100644 index 0000000..4d00c22 Binary files /dev/null and b/static/graphs/d5e96a35-7b0b-4c6a-9533-d63ecbda563e.png differ diff --git a/static/graphs/d61b7ace-ba80-4d79-9ff2-b6f80af5770b b/static/graphs/d61b7ace-ba80-4d79-9ff2-b6f80af5770b new file mode 100644 index 0000000..4c32488 --- /dev/null +++ b/static/graphs/d61b7ace-ba80-4d79-9ff2-b6f80af5770b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-MOLE66" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/d61b7ace-ba80-4d79-9ff2-b6f80af5770b.png b/static/graphs/d61b7ace-ba80-4d79-9ff2-b6f80af5770b.png new file mode 100644 index 0000000..5f71b21 Binary files /dev/null and b/static/graphs/d61b7ace-ba80-4d79-9ff2-b6f80af5770b.png differ diff --git a/static/graphs/d62ab8d5-4ba1-4c45-8a63-13fdb099b33c b/static/graphs/d62ab8d5-4ba1-4c45-8a63-13fdb099b33c new file mode 100644 index 0000000..37a8194 --- /dev/null +++ b/static/graphs/d62ab8d5-4ba1-4c45-8a63-13fdb099b33c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=WannaCry" [label="ransomware\nWannaCry",shape=box,style=filled,color=deepskyblue];"ransomware=WannaCry" -> "malpedia=WannaCryptor" [label="similar",dir="both"];} diff --git a/static/graphs/d62ab8d5-4ba1-4c45-8a63-13fdb099b33c.png b/static/graphs/d62ab8d5-4ba1-4c45-8a63-13fdb099b33c.png new file mode 100644 index 0000000..a8fc36b Binary files /dev/null and b/static/graphs/d62ab8d5-4ba1-4c45-8a63-13fdb099b33c.png differ diff --git a/static/graphs/d69c8146-ab35-4d50-8382-6fc80e641d43 b/static/graphs/d69c8146-ab35-4d50-8382-6fc80e641d43 new file mode 100644 index 0000000..1906951 --- /dev/null +++ b/static/graphs/d69c8146-ab35-4d50-8382-6fc80e641d43 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" [label="mitre-enterprise-attack-malware\nBLACKCOFFEE - S0069",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BLACKCOFFEE - S0069" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/d69c8146-ab35-4d50-8382-6fc80e641d43.png b/static/graphs/d69c8146-ab35-4d50-8382-6fc80e641d43.png new file mode 100644 index 0000000..0e89ce1 Binary files /dev/null and b/static/graphs/d69c8146-ab35-4d50-8382-6fc80e641d43.png differ diff --git a/static/graphs/d6ceeb8e-a17b-43b1-bad6-5a81192e2ebd b/static/graphs/d6ceeb8e-a17b-43b1-bad6-5a81192e2ebd new file mode 100644 index 0000000..c13cd35 --- /dev/null +++ b/static/graphs/d6ceeb8e-a17b-43b1-bad6-5a81192e2ebd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Fraud:Phishing" [label="rsit\nFraud:Phishing",shape=ellipse];} diff --git a/static/graphs/d6ceeb8e-a17b-43b1-bad6-5a81192e2ebd.png b/static/graphs/d6ceeb8e-a17b-43b1-bad6-5a81192e2ebd.png new file mode 100644 index 0000000..2fe61f8 Binary files /dev/null and b/static/graphs/d6ceeb8e-a17b-43b1-bad6-5a81192e2ebd.png differ diff --git a/static/graphs/d6e88e18-81e8-4709-82d8-973095da1e70 b/static/graphs/d6e88e18-81e8-4709-82d8-973095da1e70 new file mode 100644 index 0000000..d648e02 --- /dev/null +++ b/static/graphs/d6e88e18-81e8-4709-82d8-973095da1e70 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-intrusion-set=APT16 - G0023" [label="mitre-pre-attack-intrusion-set\nAPT16 - G0023",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=APT16 - G0023" -> "mitre-enterprise-attack-malware=ELMER - S0064" [label="uses",];"mitre-enterprise-attack-malware=ELMER - S0064" [label="mitre-enterprise-attack-malware\nELMER - S0064",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ELMER - S0064" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/d6e88e18-81e8-4709-82d8-973095da1e70.png b/static/graphs/d6e88e18-81e8-4709-82d8-973095da1e70.png new file mode 100644 index 0000000..c0ba5fc Binary files /dev/null and b/static/graphs/d6e88e18-81e8-4709-82d8-973095da1e70.png differ diff --git a/static/graphs/d70bd6a8-5fd4-42e8-8e39-fb18daeccdb2 b/static/graphs/d70bd6a8-5fd4-42e8-8e39-fb18daeccdb2 new file mode 100644 index 0000000..eb553a4 --- /dev/null +++ b/static/graphs/d70bd6a8-5fd4-42e8-8e39-fb18daeccdb2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Ruckguv" [label="tool\nRuckguv",shape=box,style=filled,color=deepskyblue];"tool=Ruckguv" -> "malpedia=Ruckguv" [label="similar",dir="both"];} diff --git a/static/graphs/d70bd6a8-5fd4-42e8-8e39-fb18daeccdb2.png b/static/graphs/d70bd6a8-5fd4-42e8-8e39-fb18daeccdb2.png new file mode 100644 index 0000000..7d899f1 Binary files /dev/null and b/static/graphs/d70bd6a8-5fd4-42e8-8e39-fb18daeccdb2.png differ diff --git a/static/graphs/d70fd29d-590e-4ed5-b72f-6ce0142019c6 b/static/graphs/d70fd29d-590e-4ed5-b72f-6ce0142019c6 new file mode 100644 index 0000000..24a1afb --- /dev/null +++ b/static/graphs/d70fd29d-590e-4ed5-b72f-6ce0142019c6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Elise Backdoor" [label="tool\nElise Backdoor",shape=box,style=filled,color=deepskyblue];"tool=Elise Backdoor" -> "mitre-enterprise-attack-malware=Elise - S0081" [label="similar",dir="both"];"tool=Elise Backdoor" -> "malpedia=Elise" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Elise - S0081" [label="mitre-enterprise-attack-malware\nElise - S0081",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Elise - S0081" -> "mitre-enterprise-attack-attack-pattern=New Service - T1050" [label="uses",];} diff --git a/static/graphs/d70fd29d-590e-4ed5-b72f-6ce0142019c6.png b/static/graphs/d70fd29d-590e-4ed5-b72f-6ce0142019c6.png new file mode 100644 index 0000000..3fc4b23 Binary files /dev/null and b/static/graphs/d70fd29d-590e-4ed5-b72f-6ce0142019c6.png differ diff --git a/static/graphs/d71604d2-a17e-4b4e-82be-19cb54f93161 b/static/graphs/d71604d2-a17e-4b4e-82be-19cb54f93161 new file mode 100644 index 0000000..5468812 --- /dev/null +++ b/static/graphs/d71604d2-a17e-4b4e-82be-19cb54f93161 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=HAYMAKER" [label="tool\nHAYMAKER",shape=box,style=filled,color=deepskyblue];"tool=HAYMAKER" -> "mitre-enterprise-attack-malware=ChChes - S0144" [label="similar",dir="both"];"tool=HAYMAKER" -> "malpedia=ChChes" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ChChes - S0144" [label="mitre-enterprise-attack-malware\nChChes - S0144",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ChChes - S0144" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/d71604d2-a17e-4b4e-82be-19cb54f93161.png b/static/graphs/d71604d2-a17e-4b4e-82be-19cb54f93161.png new file mode 100644 index 0000000..bcfa7cf Binary files /dev/null and b/static/graphs/d71604d2-a17e-4b4e-82be-19cb54f93161.png differ diff --git a/static/graphs/d7183f66-59ec-4803-be20-237b442259fc b/static/graphs/d7183f66-59ec-4803-be20-237b442259fc new file mode 100644 index 0000000..3673c12 --- /dev/null +++ b/static/graphs/d7183f66-59ec-4803-be20-237b442259fc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Havex RAT" [label="tool\nHavex RAT",shape=box,style=filled,color=deepskyblue];"tool=Havex RAT" -> "mitre-enterprise-attack-malware=Backdoor.Oldrea - S0093" [label="similar",dir="both"];"tool=Havex RAT" -> "malpedia=Havex RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Backdoor.Oldrea - S0093" [label="mitre-enterprise-attack-malware\nBackdoor.Oldrea - S0093",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Backdoor.Oldrea - S0093" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];} diff --git a/static/graphs/d7183f66-59ec-4803-be20-237b442259fc.png b/static/graphs/d7183f66-59ec-4803-be20-237b442259fc.png new file mode 100644 index 0000000..60dbd8d Binary files /dev/null and b/static/graphs/d7183f66-59ec-4803-be20-237b442259fc.png differ diff --git a/static/graphs/d7247cf9-13b6-4781-b789-a5f33521633b b/static/graphs/d7247cf9-13b6-4781-b789-a5f33521633b new file mode 100644 index 0000000..56ccb9e --- /dev/null +++ b/static/graphs/d7247cf9-13b6-4781-b789-a5f33521633b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"microsoft-activity-group=NOBELIUM" [label="microsoft-activity-group\nNOBELIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=NOBELIUM" -> "threat-actor=UNC2452" [label="similar",dir="both"];"microsoft-activity-group=NOBELIUM" -> "backdoor=SUNBURST" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=TEARDROP" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=GoldMax" [label="uses",];"backdoor=SUNBURST" [label="backdoor\nSUNBURST",shape=box,style=filled,color=deepskyblue];"backdoor=SUNBURST" -> "tool=SUNSPOT" [label="dropped-by",];"backdoor=SUNBURST" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"threat-actor=UNC2452" [label="threat-actor\nUNC2452",shape=octagon,style=filled,color=indianred1];"tool=TEARDROP" [label="tool\nTEARDROP",shape=box,style=filled,color=deepskyblue];"tool=TEARDROP" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=TEARDROP" -> "tool=Raindrop" [label="variant-of",];"tool=GoldMax" [label="tool\nGoldMax",shape=box,style=filled,color=deepskyblue];"tool=GoldMax" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=SUNSPOT" [label="tool\nSUNSPOT",shape=box,style=filled,color=deepskyblue];"tool=SUNSPOT" -> "backdoor=SUNBURST" [label="dropped",];"tool=Raindrop" [label="tool\nRaindrop",shape=box,style=filled,color=deepskyblue];"tool=Raindrop" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=Raindrop" -> "tool=TEARDROP" [label="variant-of",];} diff --git a/static/graphs/d7247cf9-13b6-4781-b789-a5f33521633b.png b/static/graphs/d7247cf9-13b6-4781-b789-a5f33521633b.png new file mode 100644 index 0000000..56513d3 Binary files /dev/null and b/static/graphs/d7247cf9-13b6-4781-b789-a5f33521633b.png differ diff --git a/static/graphs/d75a3d1b-b536-4f15-a23c-f4bcc17837b8 b/static/graphs/d75a3d1b-b536-4f15-a23c-f4bcc17837b8 new file mode 100644 index 0000000..66415a5 --- /dev/null +++ b/static/graphs/d75a3d1b-b536-4f15-a23c-f4bcc17837b8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Connection Proxy Mitigation - T1090" [label="mitre-enterprise-attack-course-of-action\nConnection Proxy Mitigation - T1090",shape=ellipse];"mitre-enterprise-attack-course-of-action=Connection Proxy Mitigation - T1090" -> "mitre-enterprise-attack-attack-pattern=Connection Proxy - T1090" [label="mitigates",];} diff --git a/static/graphs/d75a3d1b-b536-4f15-a23c-f4bcc17837b8.png b/static/graphs/d75a3d1b-b536-4f15-a23c-f4bcc17837b8.png new file mode 100644 index 0000000..99724c2 Binary files /dev/null and b/static/graphs/d75a3d1b-b536-4f15-a23c-f4bcc17837b8.png differ diff --git a/static/graphs/d7963066-62ed-4494-9b8c-4b8b691a7c82 b/static/graphs/d7963066-62ed-4494-9b8c-4b8b691a7c82 new file mode 100644 index 0000000..2881384 --- /dev/null +++ b/static/graphs/d7963066-62ed-4494-9b8c-4b8b691a7c82 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Flame" [label="tool\nFlame",shape=box,style=filled,color=deepskyblue];"tool=Flame" -> "mitre-enterprise-attack-malware=Flame - S0143" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Flame - S0143" [label="mitre-enterprise-attack-malware\nFlame - S0143",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Flame - S0143" -> "mitre-enterprise-attack-attack-pattern=Audio Capture - T1123" [label="uses",];} diff --git a/static/graphs/d7963066-62ed-4494-9b8c-4b8b691a7c82.png b/static/graphs/d7963066-62ed-4494-9b8c-4b8b691a7c82.png new file mode 100644 index 0000000..6e77e5c Binary files /dev/null and b/static/graphs/d7963066-62ed-4494-9b8c-4b8b691a7c82.png differ diff --git a/static/graphs/d7c49196-b40e-42bc-8eed-b803113692ed b/static/graphs/d7c49196-b40e-42bc-8eed-b803113692ed new file mode 100644 index 0000000..edc8144 --- /dev/null +++ b/static/graphs/d7c49196-b40e-42bc-8eed-b803113692ed @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Change Default File Association Mitigation - T1042" [label="mitre-enterprise-attack-course-of-action\nChange Default File Association Mitigation - T1042",shape=ellipse];"mitre-enterprise-attack-course-of-action=Change Default File Association Mitigation - T1042" -> "mitre-enterprise-attack-attack-pattern=Change Default File Association - T1042" [label="mitigates",];} diff --git a/static/graphs/d7c49196-b40e-42bc-8eed-b803113692ed.png b/static/graphs/d7c49196-b40e-42bc-8eed-b803113692ed.png new file mode 100644 index 0000000..fcafbd4 Binary files /dev/null and b/static/graphs/d7c49196-b40e-42bc-8eed-b803113692ed.png differ diff --git a/static/graphs/d840e5af-3e6b-49af-ab82-fb4f8740bf55 b/static/graphs/d840e5af-3e6b-49af-ab82-fb4f8740bf55 new file mode 100644 index 0000000..dda088b --- /dev/null +++ b/static/graphs/d840e5af-3e6b-49af-ab82-fb4f8740bf55 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Client Maximus" [label="rat\nClient Maximus",shape=box,style=filled,color=deepskyblue];"rat=Client Maximus" -> "malpedia=Client Maximus" [label="similar",dir="both"];} diff --git a/static/graphs/d840e5af-3e6b-49af-ab82-fb4f8740bf55.png b/static/graphs/d840e5af-3e6b-49af-ab82-fb4f8740bf55.png new file mode 100644 index 0000000..11cc0b8 Binary files /dev/null and b/static/graphs/d840e5af-3e6b-49af-ab82-fb4f8740bf55.png differ diff --git a/static/graphs/d8787791-d22e-45bb-a9a8-251d8d0a1ff2 b/static/graphs/d8787791-d22e-45bb-a9a8-251d8d0a1ff2 new file mode 100644 index 0000000..a89ee38 --- /dev/null +++ b/static/graphs/d8787791-d22e-45bb-a9a8-251d8d0a1ff2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=System Service Discovery Mitigation - T1007" [label="mitre-enterprise-attack-course-of-action\nSystem Service Discovery Mitigation - T1007",shape=ellipse];"mitre-enterprise-attack-course-of-action=System Service Discovery Mitigation - T1007" -> "mitre-enterprise-attack-attack-pattern=System Service Discovery - T1007" [label="mitigates",];} diff --git a/static/graphs/d8787791-d22e-45bb-a9a8-251d8d0a1ff2.png b/static/graphs/d8787791-d22e-45bb-a9a8-251d8d0a1ff2.png new file mode 100644 index 0000000..3f2143e Binary files /dev/null and b/static/graphs/d8787791-d22e-45bb-a9a8-251d8d0a1ff2.png differ diff --git a/static/graphs/d89c132d-7752-4c7f-9372-954a71522985 b/static/graphs/d89c132d-7752-4c7f-9372-954a71522985 new file mode 100644 index 0000000..18fecd7 --- /dev/null +++ b/static/graphs/d89c132d-7752-4c7f-9372-954a71522985 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=Trojan-SMS.AndroidOS.OpFake.a - MOB-S0024" [label="mitre-mobile-attack-malware\nTrojan-SMS.AndroidOS.OpFake.a - MOB-S0024",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Trojan-SMS.AndroidOS.OpFake.a - MOB-S0024" -> "mitre-mobile-attack-attack-pattern=Standard Application Layer Protocol - MOB-T1040" [label="uses",];} diff --git a/static/graphs/d89c132d-7752-4c7f-9372-954a71522985.png b/static/graphs/d89c132d-7752-4c7f-9372-954a71522985.png new file mode 100644 index 0000000..5d34564 Binary files /dev/null and b/static/graphs/d89c132d-7752-4c7f-9372-954a71522985.png differ diff --git a/static/graphs/d8aad68d-a68f-42e1-b755-d5f383b73401 b/static/graphs/d8aad68d-a68f-42e1-b755-d5f383b73401 new file mode 100644 index 0000000..5f47372 --- /dev/null +++ b/static/graphs/d8aad68d-a68f-42e1-b755-d5f383b73401 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=4H RAT" [label="rat\n4H RAT",shape=box,style=filled,color=deepskyblue];"rat=4H RAT" -> "mitre-enterprise-attack-malware=4H RAT - S0065" [label="similar",dir="both"];"mitre-enterprise-attack-malware=4H RAT - S0065" [label="mitre-enterprise-attack-malware\n4H RAT - S0065",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=4H RAT - S0065" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];} diff --git a/static/graphs/d8aad68d-a68f-42e1-b755-d5f383b73401.png b/static/graphs/d8aad68d-a68f-42e1-b755-d5f383b73401.png new file mode 100644 index 0000000..c8123b9 Binary files /dev/null and b/static/graphs/d8aad68d-a68f-42e1-b755-d5f383b73401.png differ diff --git a/static/graphs/d8d19e33-94fd-4aa3-b94a-08ee801a2153 b/static/graphs/d8d19e33-94fd-4aa3-b94a-08ee801a2153 new file mode 100644 index 0000000..502f425 --- /dev/null +++ b/static/graphs/d8d19e33-94fd-4aa3-b94a-08ee801a2153 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=SDelete - S0195" [label="mitre-enterprise-attack-tool\nSDelete - S0195",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=SDelete - S0195" -> "mitre-enterprise-attack-attack-pattern=Code Signing - T1116" [label="uses",];} diff --git a/static/graphs/d8d19e33-94fd-4aa3-b94a-08ee801a2153.png b/static/graphs/d8d19e33-94fd-4aa3-b94a-08ee801a2153.png new file mode 100644 index 0000000..59bcbd8 Binary files /dev/null and b/static/graphs/d8d19e33-94fd-4aa3-b94a-08ee801a2153.png differ diff --git a/static/graphs/d8fcab2d-f80c-4165-88f5-db29f7aa1087 b/static/graphs/d8fcab2d-f80c-4165-88f5-db29f7aa1087 new file mode 100644 index 0000000..0f24b8e --- /dev/null +++ b/static/graphs/d8fcab2d-f80c-4165-88f5-db29f7aa1087 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Tastylock" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/d8fcab2d-f80c-4165-88f5-db29f7aa1087.png b/static/graphs/d8fcab2d-f80c-4165-88f5-db29f7aa1087.png new file mode 100644 index 0000000..5bc103c Binary files /dev/null and b/static/graphs/d8fcab2d-f80c-4165-88f5-db29f7aa1087.png differ diff --git a/static/graphs/d909efe3-abc3-4be0-9640-e4727542fa2b b/static/graphs/d909efe3-abc3-4be0-9640-e4727542fa2b new file mode 100644 index 0000000..59452e0 --- /dev/null +++ b/static/graphs/d909efe3-abc3-4be0-9640-e4727542fa2b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=SHUTTERSPEED" [label="tool\nSHUTTERSPEED",shape=box,style=filled,color=deepskyblue];"tool=SHUTTERSPEED" -> "mitre-enterprise-attack-malware=SHUTTERSPEED - S0217" [label="similar",dir="both"];"mitre-enterprise-attack-malware=SHUTTERSPEED - S0217" [label="mitre-enterprise-attack-malware\nSHUTTERSPEED - S0217",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SHUTTERSPEED - S0217" -> "mitre-enterprise-attack-attack-pattern=Screen Capture - T1113" [label="uses",];} diff --git a/static/graphs/d909efe3-abc3-4be0-9640-e4727542fa2b.png b/static/graphs/d909efe3-abc3-4be0-9640-e4727542fa2b.png new file mode 100644 index 0000000..553ff90 Binary files /dev/null and b/static/graphs/d909efe3-abc3-4be0-9640-e4727542fa2b.png differ diff --git a/static/graphs/d93889de-b4bc-4a29-9ce7-d67717c140a0 b/static/graphs/d93889de-b4bc-4a29-9ce7-d67717c140a0 new file mode 100644 index 0000000..e482c1e --- /dev/null +++ b/static/graphs/d93889de-b4bc-4a29-9ce7-d67717c140a0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=GCMAN" [label="threat-actor\nGCMAN",shape=octagon,style=filled,color=indianred1];"threat-actor=GCMAN" -> "mitre-enterprise-attack-intrusion-set=GCMAN - G0036" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=GCMAN - G0036" [label="mitre-enterprise-attack-intrusion-set\nGCMAN - G0036",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=GCMAN - G0036" -> "mitre-enterprise-attack-attack-pattern=Remote Services - T1021" [label="uses",];} diff --git a/static/graphs/d93889de-b4bc-4a29-9ce7-d67717c140a0.png b/static/graphs/d93889de-b4bc-4a29-9ce7-d67717c140a0.png new file mode 100644 index 0000000..50e47ce Binary files /dev/null and b/static/graphs/d93889de-b4bc-4a29-9ce7-d67717c140a0.png differ diff --git a/static/graphs/d939e802-acb2-4881-bdaf-ece1eccf5699 b/static/graphs/d939e802-acb2-4881-bdaf-ece1eccf5699 new file mode 100644 index 0000000..6753afa --- /dev/null +++ b/static/graphs/d939e802-acb2-4881-bdaf-ece1eccf5699 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=ReactorBot" [label="banker\nReactorBot",shape=box,style=filled,color=deepskyblue];"banker=ReactorBot" -> "malpedia=ReactorBot" [label="similar",dir="both"];} diff --git a/static/graphs/d939e802-acb2-4881-bdaf-ece1eccf5699.png b/static/graphs/d939e802-acb2-4881-bdaf-ece1eccf5699.png new file mode 100644 index 0000000..1bf89ce Binary files /dev/null and b/static/graphs/d939e802-acb2-4881-bdaf-ece1eccf5699.png differ diff --git a/static/graphs/d9431c02-5391-11e8-931f-4beceb8bd697 b/static/graphs/d9431c02-5391-11e8-931f-4beceb8bd697 new file mode 100644 index 0000000..46908b8 --- /dev/null +++ b/static/graphs/d9431c02-5391-11e8-931f-4beceb8bd697 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Bankshot" [label="tool\nBankshot",shape=box,style=filled,color=deepskyblue];"tool=Bankshot" -> "malpedia=Bankshot" [label="similar",dir="both"];} diff --git a/static/graphs/d9431c02-5391-11e8-931f-4beceb8bd697.png b/static/graphs/d9431c02-5391-11e8-931f-4beceb8bd697.png new file mode 100644 index 0000000..334d4e7 Binary files /dev/null and b/static/graphs/d9431c02-5391-11e8-931f-4beceb8bd697.png differ diff --git a/static/graphs/d9727aee-48b8-4fdb-89e2-4c49746ba4dd b/static/graphs/d9727aee-48b8-4fdb-89e2-4c49746ba4dd new file mode 100644 index 0000000..cf1512a --- /dev/null +++ b/static/graphs/d9727aee-48b8-4fdb-89e2-4c49746ba4dd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Data from Network Shared Drive Mitigation - T1039" [label="mitre-enterprise-attack-course-of-action\nData from Network Shared Drive Mitigation - T1039",shape=ellipse];"mitre-enterprise-attack-course-of-action=Data from Network Shared Drive Mitigation - T1039" -> "mitre-enterprise-attack-attack-pattern=Data from Network Shared Drive - T1039" [label="mitigates",];} diff --git a/static/graphs/d9727aee-48b8-4fdb-89e2-4c49746ba4dd.png b/static/graphs/d9727aee-48b8-4fdb-89e2-4c49746ba4dd.png new file mode 100644 index 0000000..36875be Binary files /dev/null and b/static/graphs/d9727aee-48b8-4fdb-89e2-4c49746ba4dd.png differ diff --git a/static/graphs/d9b2305e-9802-483c-a95d-2ae8525c7704 b/static/graphs/d9b2305e-9802-483c-a95d-2ae8525c7704 new file mode 100644 index 0000000..093bd98 --- /dev/null +++ b/static/graphs/d9b2305e-9802-483c-a95d-2ae8525c7704 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=SUNSPOT" [label="tool\nSUNSPOT",shape=box,style=filled,color=deepskyblue];"tool=SUNSPOT" -> "backdoor=SUNBURST" [label="dropped",];"backdoor=SUNBURST" [label="backdoor\nSUNBURST",shape=box,style=filled,color=deepskyblue];"backdoor=SUNBURST" -> "tool=SUNSPOT" [label="dropped-by",];"backdoor=SUNBURST" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"microsoft-activity-group=NOBELIUM" [label="microsoft-activity-group\nNOBELIUM",shape=octagon,style=filled,color=indianred1];"microsoft-activity-group=NOBELIUM" -> "threat-actor=UNC2452" [label="similar",dir="both"];"microsoft-activity-group=NOBELIUM" -> "backdoor=SUNBURST" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=TEARDROP" [label="uses",];"microsoft-activity-group=NOBELIUM" -> "tool=GoldMax" [label="uses",];"threat-actor=UNC2452" [label="threat-actor\nUNC2452",shape=octagon,style=filled,color=indianred1];"tool=TEARDROP" [label="tool\nTEARDROP",shape=box,style=filled,color=deepskyblue];"tool=TEARDROP" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=TEARDROP" -> "tool=Raindrop" [label="variant-of",];"tool=GoldMax" [label="tool\nGoldMax",shape=box,style=filled,color=deepskyblue];"tool=GoldMax" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=Raindrop" [label="tool\nRaindrop",shape=box,style=filled,color=deepskyblue];"tool=Raindrop" -> "microsoft-activity-group=NOBELIUM" [label="used-by",];"tool=Raindrop" -> "tool=TEARDROP" [label="variant-of",];} diff --git a/static/graphs/d9b2305e-9802-483c-a95d-2ae8525c7704.png b/static/graphs/d9b2305e-9802-483c-a95d-2ae8525c7704.png new file mode 100644 index 0000000..f24fc13 Binary files /dev/null and b/static/graphs/d9b2305e-9802-483c-a95d-2ae8525c7704.png differ diff --git a/static/graphs/d9e07aea-baad-4b68-bdca-90c77647d7f9 b/static/graphs/d9e07aea-baad-4b68-bdca-90c77647d7f9 new file mode 100644 index 0000000..3b68b5a --- /dev/null +++ b/static/graphs/d9e07aea-baad-4b68-bdca-90c77647d7f9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=XcodeGhost - MOB-S0013" [label="mitre-mobile-attack-malware\nXcodeGhost - MOB-S0013",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=XcodeGhost - MOB-S0013" -> "mitre-mobile-attack-attack-pattern=Capture Clipboard Data - MOB-T1017" [label="uses",];} diff --git a/static/graphs/d9e07aea-baad-4b68-bdca-90c77647d7f9.png b/static/graphs/d9e07aea-baad-4b68-bdca-90c77647d7f9.png new file mode 100644 index 0000000..2531ffd Binary files /dev/null and b/static/graphs/d9e07aea-baad-4b68-bdca-90c77647d7f9.png differ diff --git a/static/graphs/d9f4b5fa-2a39-4bdf-b40a-ea998933cd6d b/static/graphs/d9f4b5fa-2a39-4bdf-b40a-ea998933cd6d new file mode 100644 index 0000000..d8d0946 --- /dev/null +++ b/static/graphs/d9f4b5fa-2a39-4bdf-b40a-ea998933cd6d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Video Capture Mitigation - T1125" [label="mitre-enterprise-attack-course-of-action\nVideo Capture Mitigation - T1125",shape=ellipse];"mitre-enterprise-attack-course-of-action=Video Capture Mitigation - T1125" -> "mitre-enterprise-attack-attack-pattern=Video Capture - T1125" [label="mitigates",];} diff --git a/static/graphs/d9f4b5fa-2a39-4bdf-b40a-ea998933cd6d.png b/static/graphs/d9f4b5fa-2a39-4bdf-b40a-ea998933cd6d.png new file mode 100644 index 0000000..7c1fa4e Binary files /dev/null and b/static/graphs/d9f4b5fa-2a39-4bdf-b40a-ea998933cd6d.png differ diff --git a/static/graphs/da079741-05e6-458c-b434-011263dc691c b/static/graphs/da079741-05e6-458c-b434-011263dc691c new file mode 100644 index 0000000..eff6925 --- /dev/null +++ b/static/graphs/da079741-05e6-458c-b434-011263dc691c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Agent.BTZ" [label="tool\nAgent.BTZ",shape=box,style=filled,color=deepskyblue];"tool=Agent.BTZ" -> "rat=ComRAT" [label="similar",dir="both"];"tool=Agent.BTZ" -> "mitre-enterprise-attack-malware=ComRAT - S0126" [label="similar",dir="both"];"tool=Agent.BTZ" -> "malpedia=Agent.BTZ" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ComRAT - S0126" [label="mitre-enterprise-attack-malware\nComRAT - S0126",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ComRAT - S0126" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"rat=ComRAT" [label="rat\nComRAT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/da079741-05e6-458c-b434-011263dc691c.png b/static/graphs/da079741-05e6-458c-b434-011263dc691c.png new file mode 100644 index 0000000..93bb86c Binary files /dev/null and b/static/graphs/da079741-05e6-458c-b434-011263dc691c.png differ diff --git a/static/graphs/da124511-463c-4514-ad05-7ec8db1b38aa b/static/graphs/da124511-463c-4514-ad05-7ec8db1b38aa new file mode 100644 index 0000000..af6a482 --- /dev/null +++ b/static/graphs/da124511-463c-4514-ad05-7ec8db1b38aa @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Fobber" [label="banker\nFobber",shape=box,style=filled,color=deepskyblue];"banker=Fobber" -> "malpedia=Fobber" [label="similar",dir="both"];} diff --git a/static/graphs/da124511-463c-4514-ad05-7ec8db1b38aa.png b/static/graphs/da124511-463c-4514-ad05-7ec8db1b38aa.png new file mode 100644 index 0000000..0ff30ba Binary files /dev/null and b/static/graphs/da124511-463c-4514-ad05-7ec8db1b38aa.png differ diff --git a/static/graphs/da21929e-40c0-443d-bdf4-6b60d15448b4 b/static/graphs/da21929e-40c0-443d-bdf4-6b60d15448b4 new file mode 100644 index 0000000..c650672 --- /dev/null +++ b/static/graphs/da21929e-40c0-443d-bdf4-6b60d15448b4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-tool=Xbot - MOB-S0014" [label="mitre-mobile-attack-tool\nXbot - MOB-S0014",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-tool=Xbot - MOB-S0014" -> "banker=TinyNuke" [label="similar",dir="both"];"mitre-mobile-attack-tool=Xbot - MOB-S0014" -> "malpedia=Xbot" [label="similar",dir="both"];"mitre-mobile-attack-tool=Xbot - MOB-S0014" -> "malpedia=TinyNuke" [label="similar",dir="both"];"mitre-mobile-attack-tool=Xbot - MOB-S0014" -> "mitre-mobile-attack-attack-pattern=Capture SMS Messages - MOB-T1015" [label="uses",];"banker=TinyNuke" [label="banker\nTinyNuke",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/da21929e-40c0-443d-bdf4-6b60d15448b4.png b/static/graphs/da21929e-40c0-443d-bdf4-6b60d15448b4.png new file mode 100644 index 0000000..33de076 Binary files /dev/null and b/static/graphs/da21929e-40c0-443d-bdf4-6b60d15448b4.png differ diff --git a/static/graphs/da2ef4a9-7cbe-400a-a379-e2f230f28db3 b/static/graphs/da2ef4a9-7cbe-400a-a379-e2f230f28db3 new file mode 100644 index 0000000..3b1890f --- /dev/null +++ b/static/graphs/da2ef4a9-7cbe-400a-a379-e2f230f28db3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=BOOTRASH - S0114" [label="mitre-enterprise-attack-malware\nBOOTRASH - S0114",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BOOTRASH - S0114" -> "mitre-enterprise-attack-attack-pattern=Bootkit - T1067" [label="uses",];} diff --git a/static/graphs/da2ef4a9-7cbe-400a-a379-e2f230f28db3.png b/static/graphs/da2ef4a9-7cbe-400a-a379-e2f230f28db3.png new file mode 100644 index 0000000..c891a14 Binary files /dev/null and b/static/graphs/da2ef4a9-7cbe-400a-a379-e2f230f28db3.png differ diff --git a/static/graphs/da49b9f1-ca99-443f-9728-0a074db66850 b/static/graphs/da49b9f1-ca99-443f-9728-0a074db66850 new file mode 100644 index 0000000..a305347 --- /dev/null +++ b/static/graphs/da49b9f1-ca99-443f-9728-0a074db66850 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=BlackOasis - G0063" [label="mitre-enterprise-attack-intrusion-set\nBlackOasis - G0063",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=BlackOasis - G0063" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];} diff --git a/static/graphs/da49b9f1-ca99-443f-9728-0a074db66850.png b/static/graphs/da49b9f1-ca99-443f-9728-0a074db66850.png new file mode 100644 index 0000000..fd795af Binary files /dev/null and b/static/graphs/da49b9f1-ca99-443f-9728-0a074db66850.png differ diff --git a/static/graphs/da5880b4-f7da-4869-85f2-e0aba84b8565 b/static/graphs/da5880b4-f7da-4869-85f2-e0aba84b8565 new file mode 100644 index 0000000..c716837 --- /dev/null +++ b/static/graphs/da5880b4-f7da-4869-85f2-e0aba84b8565 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=ComRAT - S0126" [label="mitre-enterprise-attack-malware\nComRAT - S0126",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ComRAT - S0126" -> "rat=ComRAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ComRAT - S0126" -> "malpedia=Agent.BTZ" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ComRAT - S0126" -> "tool=Agent.BTZ" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ComRAT - S0126" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"rat=ComRAT" [label="rat\nComRAT",shape=box,style=filled,color=deepskyblue];"tool=Agent.BTZ" [label="tool\nAgent.BTZ",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/da5880b4-f7da-4869-85f2-e0aba84b8565.png b/static/graphs/da5880b4-f7da-4869-85f2-e0aba84b8565.png new file mode 100644 index 0000000..d19817a Binary files /dev/null and b/static/graphs/da5880b4-f7da-4869-85f2-e0aba84b8565.png differ diff --git a/static/graphs/da754aeb-a86d-4874-b388-d1d2028a56be b/static/graphs/da754aeb-a86d-4874-b388-d1d2028a56be new file mode 100644 index 0000000..859cddd --- /dev/null +++ b/static/graphs/da754aeb-a86d-4874-b388-d1d2028a56be @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Beijing Group" [label="threat-actor\nBeijing Group",shape=octagon,style=filled,color=indianred1];"threat-actor=Beijing Group" -> "mitre-enterprise-attack-intrusion-set=Elderwood - G0066" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Elderwood - G0066" [label="mitre-enterprise-attack-intrusion-set\nElderwood - G0066",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Elderwood - G0066" -> "mitre-enterprise-attack-attack-pattern=Drive-by Compromise - T1189" [label="uses",];} diff --git a/static/graphs/da754aeb-a86d-4874-b388-d1d2028a56be.png b/static/graphs/da754aeb-a86d-4874-b388-d1d2028a56be.png new file mode 100644 index 0000000..157a660 Binary files /dev/null and b/static/graphs/da754aeb-a86d-4874-b388-d1d2028a56be.png differ diff --git a/static/graphs/da8a87d2-946d-4c34-9a30-709058b98996 b/static/graphs/da8a87d2-946d-4c34-9a30-709058b98996 new file mode 100644 index 0000000..0c41cdf --- /dev/null +++ b/static/graphs/da8a87d2-946d-4c34-9a30-709058b98996 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Input Capture Mitigation - T1056" [label="mitre-enterprise-attack-course-of-action\nInput Capture Mitigation - T1056",shape=ellipse];"mitre-enterprise-attack-course-of-action=Input Capture Mitigation - T1056" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="mitigates",];} diff --git a/static/graphs/da8a87d2-946d-4c34-9a30-709058b98996.png b/static/graphs/da8a87d2-946d-4c34-9a30-709058b98996.png new file mode 100644 index 0000000..1b9c7a9 Binary files /dev/null and b/static/graphs/da8a87d2-946d-4c34-9a30-709058b98996.png differ diff --git a/static/graphs/da987565-27b6-4b31-bbcd-74b909847116 b/static/graphs/da987565-27b6-4b31-bbcd-74b909847116 new file mode 100644 index 0000000..6bf0b82 --- /dev/null +++ b/static/graphs/da987565-27b6-4b31-bbcd-74b909847116 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Multiband Communication Mitigation - T1026" [label="mitre-enterprise-attack-course-of-action\nMultiband Communication Mitigation - T1026",shape=ellipse];"mitre-enterprise-attack-course-of-action=Multiband Communication Mitigation - T1026" -> "mitre-enterprise-attack-attack-pattern=Multiband Communication - T1026" [label="mitigates",];} diff --git a/static/graphs/da987565-27b6-4b31-bbcd-74b909847116.png b/static/graphs/da987565-27b6-4b31-bbcd-74b909847116.png new file mode 100644 index 0000000..757a5d0 Binary files /dev/null and b/static/graphs/da987565-27b6-4b31-bbcd-74b909847116.png differ diff --git a/static/graphs/dab75e38-6969-4e78-9304-dc269c3cbcf0 b/static/graphs/dab75e38-6969-4e78-9304-dc269c3cbcf0 new file mode 100644 index 0000000..a7bfdad --- /dev/null +++ b/static/graphs/dab75e38-6969-4e78-9304-dc269c3cbcf0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Stealth Falcon" [label="threat-actor\nStealth Falcon",shape=octagon,style=filled,color=indianred1];"threat-actor=Stealth Falcon" -> "mitre-enterprise-attack-intrusion-set=Stealth Falcon - G0038" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Stealth Falcon - G0038" [label="mitre-enterprise-attack-intrusion-set\nStealth Falcon - G0038",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Stealth Falcon - G0038" -> "mitre-enterprise-attack-attack-pattern=Windows Management Instrumentation - T1047" [label="uses",];} diff --git a/static/graphs/dab75e38-6969-4e78-9304-dc269c3cbcf0.png b/static/graphs/dab75e38-6969-4e78-9304-dc269c3cbcf0.png new file mode 100644 index 0000000..612e25d Binary files /dev/null and b/static/graphs/dab75e38-6969-4e78-9304-dc269c3cbcf0.png differ diff --git a/static/graphs/dadccdda-a4c2-4021-90b9-61a394e602be b/static/graphs/dadccdda-a4c2-4021-90b9-61a394e602be new file mode 100644 index 0000000..48cde28 --- /dev/null +++ b/static/graphs/dadccdda-a4c2-4021-90b9-61a394e602be @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=Sockrat" [label="android\nSockrat",shape=box,style=filled,color=deepskyblue];"android=Sockrat" -> "rat=Adwind RAT" [label="similar",dir="both"];"android=Sockrat" -> "tool=Adwind" [label="similar",dir="both"];"android=Sockrat" -> "android=Adwind" [label="similar",dir="both"];"android=Sockrat" -> "malpedia=AdWind" [label="similar",dir="both"];"android=Adwind" [label="android\nAdwind",shape=box,style=filled,color=deepskyblue];"rat=Adwind RAT" [label="rat\nAdwind RAT",shape=box,style=filled,color=deepskyblue];"tool=Adwind" [label="tool\nAdwind",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/dadccdda-a4c2-4021-90b9-61a394e602be.png b/static/graphs/dadccdda-a4c2-4021-90b9-61a394e602be.png new file mode 100644 index 0000000..656b8da Binary files /dev/null and b/static/graphs/dadccdda-a4c2-4021-90b9-61a394e602be.png differ diff --git a/static/graphs/db1355a7-e5c9-4e2c-8da7-eccf2ae9bf5c b/static/graphs/db1355a7-e5c9-4e2c-8da7-eccf2ae9bf5c new file mode 100644 index 0000000..71f7dcc --- /dev/null +++ b/static/graphs/db1355a7-e5c9-4e2c-8da7-eccf2ae9bf5c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=TURNEDUP - S0199" [label="mitre-enterprise-attack-malware\nTURNEDUP - S0199",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TURNEDUP - S0199" -> "malpedia=TURNEDUP" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TURNEDUP - S0199" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/db1355a7-e5c9-4e2c-8da7-eccf2ae9bf5c.png b/static/graphs/db1355a7-e5c9-4e2c-8da7-eccf2ae9bf5c.png new file mode 100644 index 0000000..a799883 Binary files /dev/null and b/static/graphs/db1355a7-e5c9-4e2c-8da7-eccf2ae9bf5c.png differ diff --git a/static/graphs/dba2cf74-16a9-4ed8-8536-6542fda95999 b/static/graphs/dba2cf74-16a9-4ed8-8536-6542fda95999 new file mode 100644 index 0000000..869407b --- /dev/null +++ b/static/graphs/dba2cf74-16a9-4ed8-8536-6542fda95999 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoHost" [label="ransomware\nCryptoHost",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoHost" -> "malpedia=ManameCrypt" [label="similar",dir="both"];} diff --git a/static/graphs/dba2cf74-16a9-4ed8-8536-6542fda95999.png b/static/graphs/dba2cf74-16a9-4ed8-8536-6542fda95999.png new file mode 100644 index 0000000..32f2271 Binary files /dev/null and b/static/graphs/dba2cf74-16a9-4ed8-8536-6542fda95999.png differ diff --git a/static/graphs/dbf0186e-722d-4a0a-af6a-b3460f162f84 b/static/graphs/dbf0186e-722d-4a0a-af6a-b3460f162f84 new file mode 100644 index 0000000..323aec5 --- /dev/null +++ b/static/graphs/dbf0186e-722d-4a0a-af6a-b3460f162f84 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Sudo Caching Mitigation - T1206" [label="mitre-enterprise-attack-course-of-action\nSudo Caching Mitigation - T1206",shape=ellipse];"mitre-enterprise-attack-course-of-action=Sudo Caching Mitigation - T1206" -> "mitre-enterprise-attack-attack-pattern=Sudo Caching - T1206" [label="mitigates",];} diff --git a/static/graphs/dbf0186e-722d-4a0a-af6a-b3460f162f84.png b/static/graphs/dbf0186e-722d-4a0a-af6a-b3460f162f84.png new file mode 100644 index 0000000..42b9faa Binary files /dev/null and b/static/graphs/dbf0186e-722d-4a0a-af6a-b3460f162f84.png differ diff --git a/static/graphs/dc43c2fe-355e-4a79-9570-3267b0992784 b/static/graphs/dc43c2fe-355e-4a79-9570-3267b0992784 new file mode 100644 index 0000000..ac6c3f4 --- /dev/null +++ b/static/graphs/dc43c2fe-355e-4a79-9570-3267b0992784 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Dylib Hijacking Mitigation - T1157" [label="mitre-enterprise-attack-course-of-action\nDylib Hijacking Mitigation - T1157",shape=ellipse];"mitre-enterprise-attack-course-of-action=Dylib Hijacking Mitigation - T1157" -> "mitre-enterprise-attack-attack-pattern=Dylib Hijacking - T1157" [label="mitigates",];} diff --git a/static/graphs/dc43c2fe-355e-4a79-9570-3267b0992784.png b/static/graphs/dc43c2fe-355e-4a79-9570-3267b0992784.png new file mode 100644 index 0000000..ce4799f Binary files /dev/null and b/static/graphs/dc43c2fe-355e-4a79-9570-3267b0992784.png differ diff --git a/static/graphs/dc5d1a33-62aa-4a0c-aa8c-589b87beb11e b/static/graphs/dc5d1a33-62aa-4a0c-aa8c-589b87beb11e new file mode 100644 index 0000000..966b4ee --- /dev/null +++ b/static/graphs/dc5d1a33-62aa-4a0c-aa8c-589b87beb11e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=ChChes - S0144" [label="mitre-enterprise-attack-malware\nChChes - S0144",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ChChes - S0144" -> "tool=HAYMAKER" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ChChes - S0144" -> "malpedia=ChChes" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ChChes - S0144" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=HAYMAKER" [label="tool\nHAYMAKER",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/dc5d1a33-62aa-4a0c-aa8c-589b87beb11e.png b/static/graphs/dc5d1a33-62aa-4a0c-aa8c-589b87beb11e.png new file mode 100644 index 0000000..7db0706 Binary files /dev/null and b/static/graphs/dc5d1a33-62aa-4a0c-aa8c-589b87beb11e.png differ diff --git a/static/graphs/dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5 b/static/graphs/dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5 new file mode 100644 index 0000000..5c231eb --- /dev/null +++ b/static/graphs/dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Mirai" [label="tool\nMirai",shape=box,style=filled,color=deepskyblue];"tool=Mirai" -> "botnet=Mirai" [label="similar",dir="both"];"tool=Mirai" -> "malpedia=Mirai (ELF)" [label="similar",dir="both"];"tool=Mirai" -> "botnet=Owari" [label="variant-of",];"tool=Mirai" -> "botnet=Sora" [label="variant-of",];"botnet=Mirai" [label="botnet\nMirai",shape=box,style=filled,color=deepskyblue];"botnet=Mirai" -> "botnet=Owari" [label="variant-of",];"botnet=Mirai" -> "botnet=Sora" [label="variant-of",];"botnet=Owari" [label="botnet\nOwari",shape=box,style=filled,color=deepskyblue];"botnet=Owari" -> "malpedia=Owari" [label="similar",dir="both"];"botnet=Owari" -> "botnet=Mirai" [label="variant-of",];"botnet=Owari" -> "tool=Mirai" [label="variant-of",];"botnet=Owari" -> "botnet=Sora" [label="variant-of",];"botnet=Sora" [label="botnet\nSora",shape=box,style=filled,color=deepskyblue];"botnet=Sora" -> "botnet=Mirai" [label="variant-of",];"botnet=Sora" -> "tool=Mirai" [label="variant-of",];"botnet=Sora" -> "botnet=Owari" [label="variant-of",];} diff --git a/static/graphs/dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5.png b/static/graphs/dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5.png new file mode 100644 index 0000000..5e1416e Binary files /dev/null and b/static/graphs/dcbf1aaa-1fdd-4bfc-a35e-145ffdfb5ac5.png differ diff --git a/static/graphs/dcd81c6e-ebf7-4a16-93e0-9a97fa49c88a b/static/graphs/dcd81c6e-ebf7-4a16-93e0-9a97fa49c88a new file mode 100644 index 0000000..29338bc --- /dev/null +++ b/static/graphs/dcd81c6e-ebf7-4a16-93e0-9a97fa49c88a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=CopyKittens - G0052" [label="mitre-enterprise-attack-intrusion-set\nCopyKittens - G0052",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=CopyKittens - G0052" -> "threat-actor=CopyKittens" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=CopyKittens - G0052" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"threat-actor=CopyKittens" [label="threat-actor\nCopyKittens",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/dcd81c6e-ebf7-4a16-93e0-9a97fa49c88a.png b/static/graphs/dcd81c6e-ebf7-4a16-93e0-9a97fa49c88a.png new file mode 100644 index 0000000..3094ac1 Binary files /dev/null and b/static/graphs/dcd81c6e-ebf7-4a16-93e0-9a97fa49c88a.png differ diff --git a/static/graphs/dd356ed3-42b8-4587-ae53-95f933517612 b/static/graphs/dd356ed3-42b8-4587-ae53-95f933517612 new file mode 100644 index 0000000..87dfb7e --- /dev/null +++ b/static/graphs/dd356ed3-42b8-4587-ae53-95f933517612 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Alphabet Ransomware" [label="ransomware\nAlphabet Ransomware",shape=box,style=filled,color=deepskyblue];"ransomware=Alphabet Ransomware" -> "malpedia=Alphabet Ransomware" [label="similar",dir="both"];} diff --git a/static/graphs/dd356ed3-42b8-4587-ae53-95f933517612.png b/static/graphs/dd356ed3-42b8-4587-ae53-95f933517612.png new file mode 100644 index 0000000..f52bf23 Binary files /dev/null and b/static/graphs/dd356ed3-42b8-4587-ae53-95f933517612.png differ diff --git a/static/graphs/dd4358a4-7a43-42f7-8322-0f941ee61e57 b/static/graphs/dd4358a4-7a43-42f7-8322-0f941ee61e57 new file mode 100644 index 0000000..5f54f92 --- /dev/null +++ b/static/graphs/dd4358a4-7a43-42f7-8322-0f941ee61e57 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=FINSPY" [label="tool\nFINSPY",shape=box,style=filled,color=deepskyblue];"tool=FINSPY" -> "rat=FINSPY" [label="similar",dir="both"];"rat=FINSPY" [label="rat\nFINSPY",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/dd4358a4-7a43-42f7-8322-0f941ee61e57.png b/static/graphs/dd4358a4-7a43-42f7-8322-0f941ee61e57.png new file mode 100644 index 0000000..1281ee7 Binary files /dev/null and b/static/graphs/dd4358a4-7a43-42f7-8322-0f941ee61e57.png differ diff --git a/static/graphs/dd919e75-57e8-4e5c-9451-8be6e734f1f3 b/static/graphs/dd919e75-57e8-4e5c-9451-8be6e734f1f3 new file mode 100644 index 0000000..d388f7f --- /dev/null +++ b/static/graphs/dd919e75-57e8-4e5c-9451-8be6e734f1f3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=SURTR" [label="tool\nSURTR",shape=box,style=filled,color=deepskyblue];"tool=SURTR" -> "tool=Reaver" [label="similar",dir="both"];"tool=SURTR" -> "tool=SunOrcal" [label="similar",dir="both"];"tool=Reaver" [label="tool\nReaver",shape=box,style=filled,color=deepskyblue];"tool=SunOrcal" [label="tool\nSunOrcal",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/dd919e75-57e8-4e5c-9451-8be6e734f1f3.png b/static/graphs/dd919e75-57e8-4e5c-9451-8be6e734f1f3.png new file mode 100644 index 0000000..20d9456 Binary files /dev/null and b/static/graphs/dd919e75-57e8-4e5c-9451-8be6e734f1f3.png differ diff --git a/static/graphs/dd9a85ad-6a92-4986-a215-b01d0ce7b987 b/static/graphs/dd9a85ad-6a92-4986-a215-b01d0ce7b987 new file mode 100644 index 0000000..1a1b96b --- /dev/null +++ b/static/graphs/dd9a85ad-6a92-4986-a215-b01d0ce7b987 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Permission Groups Discovery Mitigation - T1069" [label="mitre-enterprise-attack-course-of-action\nPermission Groups Discovery Mitigation - T1069",shape=ellipse];"mitre-enterprise-attack-course-of-action=Permission Groups Discovery Mitigation - T1069" -> "mitre-enterprise-attack-attack-pattern=Permission Groups Discovery - T1069" [label="mitigates",];} diff --git a/static/graphs/dd9a85ad-6a92-4986-a215-b01d0ce7b987.png b/static/graphs/dd9a85ad-6a92-4986-a215-b01d0ce7b987.png new file mode 100644 index 0000000..f1602ad Binary files /dev/null and b/static/graphs/dd9a85ad-6a92-4986-a215-b01d0ce7b987.png differ diff --git a/static/graphs/de53f392-8794-43d1-a38b-c0b90c20a3fb b/static/graphs/de53f392-8794-43d1-a38b-c0b90c20a3fb new file mode 100644 index 0000000..81dcd59 --- /dev/null +++ b/static/graphs/de53f392-8794-43d1-a38b-c0b90c20a3fb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoRansomeware" [label="ransomware\nCryptoRansomeware",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoRansomeware" -> "malpedia=CryptoRansomeware" [label="similar",dir="both"];} diff --git a/static/graphs/de53f392-8794-43d1-a38b-c0b90c20a3fb.png b/static/graphs/de53f392-8794-43d1-a38b-c0b90c20a3fb.png new file mode 100644 index 0000000..be3e096 Binary files /dev/null and b/static/graphs/de53f392-8794-43d1-a38b-c0b90c20a3fb.png differ diff --git a/static/graphs/de6cb631-52f6-4169-a73b-7965390b0c30 b/static/graphs/de6cb631-52f6-4169-a73b-7965390b0c30 new file mode 100644 index 0000000..6654d92 --- /dev/null +++ b/static/graphs/de6cb631-52f6-4169-a73b-7965390b0c30 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=JPIN - S0201" [label="mitre-enterprise-attack-malware\nJPIN - S0201",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=JPIN - S0201" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];} diff --git a/static/graphs/de6cb631-52f6-4169-a73b-7965390b0c30.png b/static/graphs/de6cb631-52f6-4169-a73b-7965390b0c30.png new file mode 100644 index 0000000..38211cb Binary files /dev/null and b/static/graphs/de6cb631-52f6-4169-a73b-7965390b0c30.png differ diff --git a/static/graphs/dea60439-7e04-4af8-aeab-2840893195f7 b/static/graphs/dea60439-7e04-4af8-aeab-2840893195f7 new file mode 100644 index 0000000..2b5bf2d --- /dev/null +++ b/static/graphs/dea60439-7e04-4af8-aeab-2840893195f7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Intrusions:Privileged Account Compromise" [label="rsit\nIntrusions:Privileged Account Compromise",shape=ellipse];"rsit=Intrusions:Privileged Account Compromise" -> "mitre-enterprise-attack-attack-pattern=Valid Accounts - T1078" [label="similar",dir="both"];} diff --git a/static/graphs/dea60439-7e04-4af8-aeab-2840893195f7.png b/static/graphs/dea60439-7e04-4af8-aeab-2840893195f7.png new file mode 100644 index 0000000..5966868 Binary files /dev/null and b/static/graphs/dea60439-7e04-4af8-aeab-2840893195f7.png differ diff --git a/static/graphs/df36267b-7267-4c23-a7a1-cf94ef1b3729 b/static/graphs/df36267b-7267-4c23-a7a1-cf94ef1b3729 new file mode 100644 index 0000000..e3f9124 --- /dev/null +++ b/static/graphs/df36267b-7267-4c23-a7a1-cf94ef1b3729 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=Sofacy" [label="android\nSofacy",shape=box,style=filled,color=deepskyblue];"android=Sofacy" -> "tool=GAMEFISH" [label="similar",dir="both"];"android=Sofacy" -> "tool=SOURFACE" [label="similar",dir="both"];"android=Sofacy" -> "tool=CORESHELL" [label="similar",dir="both"];"tool=GAMEFISH" [label="tool\nGAMEFISH",shape=box,style=filled,color=deepskyblue];"tool=GAMEFISH" -> "mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="similar",dir="both"];"tool=GAMEFISH" -> "mitre-enterprise-attack-malware=Komplex - S0162" [label="similar",dir="both"];"tool=GAMEFISH" -> "malpedia=Komplex" [label="similar",dir="both"];"tool=GAMEFISH" -> "malpedia=Seduploader" [label="similar",dir="both"];"tool=SOURFACE" [label="tool\nSOURFACE",shape=box,style=filled,color=deepskyblue];"tool=SOURFACE" -> "mitre-enterprise-attack-malware=CORESHELL - S0137" [label="similar",dir="both"];"tool=CORESHELL" [label="tool\nCORESHELL",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" [label="mitre-enterprise-attack-malware\nKomplex - S0162",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"mitre-enterprise-attack-malware=CORESHELL - S0137" [label="mitre-enterprise-attack-malware\nCORESHELL - S0137",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CORESHELL - S0137" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="mitre-enterprise-attack-malware\nJHUHUGIT - S0044",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Privilege Escalation - T1068" [label="uses",];} diff --git a/static/graphs/df36267b-7267-4c23-a7a1-cf94ef1b3729.png b/static/graphs/df36267b-7267-4c23-a7a1-cf94ef1b3729.png new file mode 100644 index 0000000..24bc2b5 Binary files /dev/null and b/static/graphs/df36267b-7267-4c23-a7a1-cf94ef1b3729.png differ diff --git a/static/graphs/df71bb3b-813c-45eb-a8bc-f2a419837411 b/static/graphs/df71bb3b-813c-45eb-a8bc-f2a419837411 new file mode 100644 index 0000000..2964578 --- /dev/null +++ b/static/graphs/df71bb3b-813c-45eb-a8bc-f2a419837411 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Molerats - G0021" [label="mitre-enterprise-attack-intrusion-set\nMolerats - G0021",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Molerats - G0021" -> "threat-actor=Molerats" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Molerats - G0021" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];"threat-actor=Molerats" [label="threat-actor\nMolerats",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/df71bb3b-813c-45eb-a8bc-f2a419837411.png b/static/graphs/df71bb3b-813c-45eb-a8bc-f2a419837411.png new file mode 100644 index 0000000..874765f Binary files /dev/null and b/static/graphs/df71bb3b-813c-45eb-a8bc-f2a419837411.png differ diff --git a/static/graphs/dfa4eaf4-50d9-49de-89e9-d33f579f3e05 b/static/graphs/dfa4eaf4-50d9-49de-89e9-d33f579f3e05 new file mode 100644 index 0000000..07575e2 --- /dev/null +++ b/static/graphs/dfa4eaf4-50d9-49de-89e9-d33f579f3e05 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Determine 3rd party infrastructure services - PRE-T1061" [label="mitre-pre-attack-attack-pattern\nDetermine 3rd party infrastructure services - PRE-T1061",shape=ellipse];"mitre-pre-attack-attack-pattern=Determine 3rd party infrastructure services - PRE-T1061" -> "mitre-pre-attack-attack-pattern=Determine 3rd party infrastructure services - PRE-T1037" [label="related-to",];"mitre-pre-attack-attack-pattern=Determine 3rd party infrastructure services - PRE-T1037" [label="mitre-pre-attack-attack-pattern\nDetermine 3rd party infrastructure services - PRE-T1037",shape=ellipse];"mitre-pre-attack-attack-pattern=Determine 3rd party infrastructure services - PRE-T1037" -> "mitre-pre-attack-attack-pattern=Determine 3rd party infrastructure services - PRE-T1061" [label="related-to",];} diff --git a/static/graphs/dfa4eaf4-50d9-49de-89e9-d33f579f3e05.png b/static/graphs/dfa4eaf4-50d9-49de-89e9-d33f579f3e05.png new file mode 100644 index 0000000..4e93324 Binary files /dev/null and b/static/graphs/dfa4eaf4-50d9-49de-89e9-d33f579f3e05.png differ diff --git a/static/graphs/dfb5fa9b-3051-4b97-8035-08f80aef945b b/static/graphs/dfb5fa9b-3051-4b97-8035-08f80aef945b new file mode 100644 index 0000000..2c95071 --- /dev/null +++ b/static/graphs/dfb5fa9b-3051-4b97-8035-08f80aef945b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Psylo - S0078" [label="mitre-enterprise-attack-malware\nPsylo - S0078",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Psylo - S0078" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/dfb5fa9b-3051-4b97-8035-08f80aef945b.png b/static/graphs/dfb5fa9b-3051-4b97-8035-08f80aef945b.png new file mode 100644 index 0000000..7705f7d Binary files /dev/null and b/static/graphs/dfb5fa9b-3051-4b97-8035-08f80aef945b.png differ diff --git a/static/graphs/e03873ef-9e3d-4d07-85d8-e22a55f60c19 b/static/graphs/e03873ef-9e3d-4d07-85d8-e22a55f60c19 new file mode 100644 index 0000000..75432f4 --- /dev/null +++ b/static/graphs/e03873ef-9e3d-4d07-85d8-e22a55f60c19 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Fake Globe Ransomware" [label="ransomware\nFake Globe Ransomware",shape=box,style=filled,color=deepskyblue];"ransomware=Fake Globe Ransomware" -> "malpedia=GlobeImposter" [label="similar",dir="both"];} diff --git a/static/graphs/e03873ef-9e3d-4d07-85d8-e22a55f60c19.png b/static/graphs/e03873ef-9e3d-4d07-85d8-e22a55f60c19.png new file mode 100644 index 0000000..cf3828e Binary files /dev/null and b/static/graphs/e03873ef-9e3d-4d07-85d8-e22a55f60c19.png differ diff --git a/static/graphs/e066bf86-9cfb-407a-9d25-26fd5d91e360 b/static/graphs/e066bf86-9cfb-407a-9d25-26fd5d91e360 new file mode 100644 index 0000000..b77a697 --- /dev/null +++ b/static/graphs/e066bf86-9cfb-407a-9d25-26fd5d91e360 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=HTTPBrowser - S0070" [label="mitre-enterprise-attack-malware\nHTTPBrowser - S0070",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=HTTPBrowser - S0070" -> "tool=HTTPBrowser" [label="similar",dir="both"];"mitre-enterprise-attack-malware=HTTPBrowser - S0070" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];"tool=HTTPBrowser" [label="tool\nHTTPBrowser",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e066bf86-9cfb-407a-9d25-26fd5d91e360.png b/static/graphs/e066bf86-9cfb-407a-9d25-26fd5d91e360.png new file mode 100644 index 0000000..75543a1 Binary files /dev/null and b/static/graphs/e066bf86-9cfb-407a-9d25-26fd5d91e360.png differ diff --git a/static/graphs/e0703d4f-3972-424a-8277-84004817e024 b/static/graphs/e0703d4f-3972-424a-8277-84004817e024 new file mode 100644 index 0000000..c8c289a --- /dev/null +++ b/static/graphs/e0703d4f-3972-424a-8277-84004817e024 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Path Interception Mitigation - T1034" [label="mitre-enterprise-attack-course-of-action\nPath Interception Mitigation - T1034",shape=ellipse];"mitre-enterprise-attack-course-of-action=Path Interception Mitigation - T1034" -> "mitre-enterprise-attack-attack-pattern=Path Interception - T1034" [label="mitigates",];} diff --git a/static/graphs/e0703d4f-3972-424a-8277-84004817e024.png b/static/graphs/e0703d4f-3972-424a-8277-84004817e024.png new file mode 100644 index 0000000..c917540 Binary files /dev/null and b/static/graphs/e0703d4f-3972-424a-8277-84004817e024.png differ diff --git a/static/graphs/e0bea149-2def-484f-b658-f782a4f94815 b/static/graphs/e0bea149-2def-484f-b658-f782a4f94815 new file mode 100644 index 0000000..5ec7eb8 --- /dev/null +++ b/static/graphs/e0bea149-2def-484f-b658-f782a4f94815 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=FALLCHILL" [label="rat\nFALLCHILL",shape=box,style=filled,color=deepskyblue];"rat=FALLCHILL" -> "mitre-enterprise-attack-malware=FALLCHILL - S0181" [label="similar",dir="both"];"rat=FALLCHILL" -> "malpedia=Volgmer" [label="similar",dir="both"];"rat=FALLCHILL" -> "tool=Volgmer" [label="similar",dir="both"];"mitre-enterprise-attack-malware=FALLCHILL - S0181" [label="mitre-enterprise-attack-malware\nFALLCHILL - S0181",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=FALLCHILL - S0181" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];"tool=Volgmer" [label="tool\nVolgmer",shape=box,style=filled,color=deepskyblue];"tool=Volgmer" -> "mitre-enterprise-attack-malware=Volgmer - S0180" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Volgmer - S0180" [label="mitre-enterprise-attack-malware\nVolgmer - S0180",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Volgmer - S0180" -> "mitre-enterprise-attack-attack-pattern=Standard Cryptographic Protocol - T1032" [label="uses",];} diff --git a/static/graphs/e0bea149-2def-484f-b658-f782a4f94815.png b/static/graphs/e0bea149-2def-484f-b658-f782a4f94815.png new file mode 100644 index 0000000..cf660b4 Binary files /dev/null and b/static/graphs/e0bea149-2def-484f-b658-f782a4f94815.png differ diff --git a/static/graphs/e0e79fab-0f1d-4fc2-b424-208cb019a9cd b/static/graphs/e0e79fab-0f1d-4fc2-b424-208cb019a9cd new file mode 100644 index 0000000..4a0b06f --- /dev/null +++ b/static/graphs/e0e79fab-0f1d-4fc2-b424-208cb019a9cd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"backdoor=WellMess" [label="backdoor\nWellMess",shape=box,style=filled,color=deepskyblue];"backdoor=WellMess" -> "malpedia=WellMess" [label="similar",dir="both"];} diff --git a/static/graphs/e0e79fab-0f1d-4fc2-b424-208cb019a9cd.png b/static/graphs/e0e79fab-0f1d-4fc2-b424-208cb019a9cd.png new file mode 100644 index 0000000..bd77c33 Binary files /dev/null and b/static/graphs/e0e79fab-0f1d-4fc2-b424-208cb019a9cd.png differ diff --git a/static/graphs/e1161124-f22e-487f-9d5f-ed8efc8dcd61 b/static/graphs/e1161124-f22e-487f-9d5f-ed8efc8dcd61 new file mode 100644 index 0000000..7f4f3b8 --- /dev/null +++ b/static/graphs/e1161124-f22e-487f-9d5f-ed8efc8dcd61 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Mis-Type - S0084" [label="mitre-enterprise-attack-malware\nMis-Type - S0084",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Mis-Type - S0084" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/e1161124-f22e-487f-9d5f-ed8efc8dcd61.png b/static/graphs/e1161124-f22e-487f-9d5f-ed8efc8dcd61.png new file mode 100644 index 0000000..359dc74 Binary files /dev/null and b/static/graphs/e1161124-f22e-487f-9d5f-ed8efc8dcd61.png differ diff --git a/static/graphs/e13d084c-382f-40fd-aa9a-98d69e20301e b/static/graphs/e13d084c-382f-40fd-aa9a-98d69e20301e new file mode 100644 index 0000000..60ba939 --- /dev/null +++ b/static/graphs/e13d084c-382f-40fd-aa9a-98d69e20301e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=BrainTest - MOB-S0009" [label="mitre-mobile-attack-malware\nBrainTest - MOB-S0009",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=BrainTest - MOB-S0009" -> "mitre-mobile-attack-attack-pattern=Download New Code at Runtime - MOB-T1010" [label="uses",];"mitre-mobile-attack-malware=BrainTest - MOB-S0009" -> "mitre-mobile-attack-attack-pattern=Obfuscated or Encrypted Payload - MOB-T1009" [label="uses",];} diff --git a/static/graphs/e13d084c-382f-40fd-aa9a-98d69e20301e.png b/static/graphs/e13d084c-382f-40fd-aa9a-98d69e20301e.png new file mode 100644 index 0000000..f74a577 Binary files /dev/null and b/static/graphs/e13d084c-382f-40fd-aa9a-98d69e20301e.png differ diff --git a/static/graphs/e159c4f8-3c22-49f9-a60a-16588a9c22b0 b/static/graphs/e159c4f8-3c22-49f9-a60a-16588a9c22b0 new file mode 100644 index 0000000..ab1a20c --- /dev/null +++ b/static/graphs/e159c4f8-3c22-49f9-a60a-16588a9c22b0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Dok" [label="banker\nDok",shape=box,style=filled,color=deepskyblue];"banker=Dok" -> "malpedia=Retefe (Android)" [label="similar",dir="both"];"banker=Dok" -> "malpedia=Dok" [label="similar",dir="both"];} diff --git a/static/graphs/e159c4f8-3c22-49f9-a60a-16588a9c22b0.png b/static/graphs/e159c4f8-3c22-49f9-a60a-16588a9c22b0.png new file mode 100644 index 0000000..d9e4646 Binary files /dev/null and b/static/graphs/e159c4f8-3c22-49f9-a60a-16588a9c22b0.png differ diff --git a/static/graphs/e170995d-4f61-4f17-b60e-04f9a06ee517 b/static/graphs/e170995d-4f61-4f17-b60e-04f9a06ee517 new file mode 100644 index 0000000..4a3bd05 --- /dev/null +++ b/static/graphs/e170995d-4f61-4f17-b60e-04f9a06ee517 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Dipsind - S0200" [label="mitre-enterprise-attack-malware\nDipsind - S0200",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Dipsind - S0200" -> "mitre-enterprise-attack-attack-pattern=Winlogon Helper DLL - T1004" [label="uses",];} diff --git a/static/graphs/e170995d-4f61-4f17-b60e-04f9a06ee517.png b/static/graphs/e170995d-4f61-4f17-b60e-04f9a06ee517.png new file mode 100644 index 0000000..ca67bc4 Binary files /dev/null and b/static/graphs/e170995d-4f61-4f17-b60e-04f9a06ee517.png differ diff --git a/static/graphs/e1bfe1d9-190c-4cf4-aec8-a8f2c41c7d8b b/static/graphs/e1bfe1d9-190c-4cf4-aec8-a8f2c41c7d8b new file mode 100644 index 0000000..5909912 --- /dev/null +++ b/static/graphs/e1bfe1d9-190c-4cf4-aec8-a8f2c41c7d8b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=HyperBro" [label="tool\nHyperBro",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e1bfe1d9-190c-4cf4-aec8-a8f2c41c7d8b.png b/static/graphs/e1bfe1d9-190c-4cf4-aec8-a8f2c41c7d8b.png new file mode 100644 index 0000000..3454e11 Binary files /dev/null and b/static/graphs/e1bfe1d9-190c-4cf4-aec8-a8f2c41c7d8b.png differ diff --git a/static/graphs/e1ca79eb-5629-4267-bb37-3992c7126ef4 b/static/graphs/e1ca79eb-5629-4267-bb37-3992c7126ef4 new file mode 100644 index 0000000..5e3c3a0 --- /dev/null +++ b/static/graphs/e1ca79eb-5629-4267-bb37-3992c7126ef4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=EVILNUM" [label="tool\nEVILNUM",shape=box,style=filled,color=deepskyblue];"tool=EVILNUM" -> "rat=Cardinal" [label="similar",dir="both"];"tool=EVILNUM" -> "tool=Cardinal RAT" [label="similar",dir="both"];"rat=Cardinal" [label="rat\nCardinal",shape=box,style=filled,color=deepskyblue];"tool=Cardinal RAT" [label="tool\nCardinal RAT",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e1ca79eb-5629-4267-bb37-3992c7126ef4.png b/static/graphs/e1ca79eb-5629-4267-bb37-3992c7126ef4.png new file mode 100644 index 0000000..683d5d7 Binary files /dev/null and b/static/graphs/e1ca79eb-5629-4267-bb37-3992c7126ef4.png differ diff --git a/static/graphs/e1eea458-c466-48d8-a121-f5fe14a1cc75 b/static/graphs/e1eea458-c466-48d8-a121-f5fe14a1cc75 new file mode 100644 index 0000000..3f13a59 --- /dev/null +++ b/static/graphs/e1eea458-c466-48d8-a121-f5fe14a1cc75 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-XZZX" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-0000" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];} diff --git a/static/graphs/e1eea458-c466-48d8-a121-f5fe14a1cc75.png b/static/graphs/e1eea458-c466-48d8-a121-f5fe14a1cc75.png new file mode 100644 index 0000000..b52f434 Binary files /dev/null and b/static/graphs/e1eea458-c466-48d8-a121-f5fe14a1cc75.png differ diff --git a/static/graphs/e211ea8d-5042-48ae-86c6-15186d1f8dba b/static/graphs/e211ea8d-5042-48ae-86c6-15186d1f8dba new file mode 100644 index 0000000..8cca7ba --- /dev/null +++ b/static/graphs/e211ea8d-5042-48ae-86c6-15186d1f8dba @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Patcher" [label="ransomware\nPatcher",shape=box,style=filled,color=deepskyblue];"ransomware=Patcher" -> "ransomware=FileCoder" [label="similar",dir="both"];"ransomware=Patcher" -> "malpedia=Patcher" [label="similar",dir="both"];"ransomware=FileCoder" [label="ransomware\nFileCoder",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e211ea8d-5042-48ae-86c6-15186d1f8dba.png b/static/graphs/e211ea8d-5042-48ae-86c6-15186d1f8dba.png new file mode 100644 index 0000000..159d929 Binary files /dev/null and b/static/graphs/e211ea8d-5042-48ae-86c6-15186d1f8dba.png differ diff --git a/static/graphs/e272d0b5-cdfc-422a-bb78-9214475daec5 b/static/graphs/e272d0b5-cdfc-422a-bb78-9214475daec5 new file mode 100644 index 0000000..8e3ecd5 --- /dev/null +++ b/static/graphs/e272d0b5-cdfc-422a-bb78-9214475daec5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptXXX 2.0" [label="ransomware\nCryptXXX 2.0",shape=box,style=filled,color=deepskyblue];"ransomware=CryptXXX 2.0" -> "ransomware=CryptXXX" [label="similar",dir="both"];"ransomware=CryptXXX" [label="ransomware\nCryptXXX",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e272d0b5-cdfc-422a-bb78-9214475daec5.png b/static/graphs/e272d0b5-cdfc-422a-bb78-9214475daec5.png new file mode 100644 index 0000000..af8bb82 Binary files /dev/null and b/static/graphs/e272d0b5-cdfc-422a-bb78-9214475daec5.png differ diff --git a/static/graphs/e2c18713-0a95-4092-a0e9-76358512daad b/static/graphs/e2c18713-0a95-4092-a0e9-76358512daad new file mode 100644 index 0000000..e9c1d5b --- /dev/null +++ b/static/graphs/e2c18713-0a95-4092-a0e9-76358512daad @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=CALENDAR" [label="tool\nCALENDAR",shape=box,style=filled,color=deepskyblue];"tool=CALENDAR" -> "mitre-enterprise-attack-malware=CALENDAR - S0025" [label="similar",dir="both"];"mitre-enterprise-attack-malware=CALENDAR - S0025" [label="mitre-enterprise-attack-malware\nCALENDAR - S0025",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CALENDAR - S0025" -> "mitre-enterprise-attack-attack-pattern=Web Service - T1102" [label="uses",];} diff --git a/static/graphs/e2c18713-0a95-4092-a0e9-76358512daad.png b/static/graphs/e2c18713-0a95-4092-a0e9-76358512daad.png new file mode 100644 index 0000000..9c41264 Binary files /dev/null and b/static/graphs/e2c18713-0a95-4092-a0e9-76358512daad.png differ diff --git a/static/graphs/e2cc27a2-4146-4f08-8e80-114a99204cea b/static/graphs/e2cc27a2-4146-4f08-8e80-114a99204cea new file mode 100644 index 0000000..46aceb0 --- /dev/null +++ b/static/graphs/e2cc27a2-4146-4f08-8e80-114a99204cea @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];"tool=TinyZBot" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];} diff --git a/static/graphs/e2cc27a2-4146-4f08-8e80-114a99204cea.png b/static/graphs/e2cc27a2-4146-4f08-8e80-114a99204cea.png new file mode 100644 index 0000000..a3e5f0f Binary files /dev/null and b/static/graphs/e2cc27a2-4146-4f08-8e80-114a99204cea.png differ diff --git a/static/graphs/e2fa7aea-fb33-4efc-b61b-ccae71b32e7d b/static/graphs/e2fa7aea-fb33-4efc-b61b-ccae71b32e7d new file mode 100644 index 0000000..e696b37 --- /dev/null +++ b/static/graphs/e2fa7aea-fb33-4efc-b61b-ccae71b32e7d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Odinaff" [label="tool\nOdinaff",shape=box,style=filled,color=deepskyblue];"tool=Odinaff" -> "malpedia=Odinaff" [label="similar",dir="both"];} diff --git a/static/graphs/e2fa7aea-fb33-4efc-b61b-ccae71b32e7d.png b/static/graphs/e2fa7aea-fb33-4efc-b61b-ccae71b32e7d.png new file mode 100644 index 0000000..692ad1b Binary files /dev/null and b/static/graphs/e2fa7aea-fb33-4efc-b61b-ccae71b32e7d.png differ diff --git a/static/graphs/e30cc912-7ea1-4683-9219-543b86cbdec9 b/static/graphs/e30cc912-7ea1-4683-9219-543b86cbdec9 new file mode 100644 index 0000000..37696f9 --- /dev/null +++ b/static/graphs/e30cc912-7ea1-4683-9219-543b86cbdec9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Fake Developer Accounts - MOB-T1045" [label="mitre-mobile-attack-attack-pattern\nFake Developer Accounts - MOB-T1045",shape=ellipse];} diff --git a/static/graphs/e30cc912-7ea1-4683-9219-543b86cbdec9.png b/static/graphs/e30cc912-7ea1-4683-9219-543b86cbdec9.png new file mode 100644 index 0000000..e7b2f54 Binary files /dev/null and b/static/graphs/e30cc912-7ea1-4683-9219-543b86cbdec9.png differ diff --git a/static/graphs/e333cf16-5bfa-453e-8e6a-3a4c63d6bfcc b/static/graphs/e333cf16-5bfa-453e-8e6a-3a4c63d6bfcc new file mode 100644 index 0000000..1968e3d --- /dev/null +++ b/static/graphs/e333cf16-5bfa-453e-8e6a-3a4c63d6bfcc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Launchctl Mitigation - T1152" [label="mitre-enterprise-attack-course-of-action\nLaunchctl Mitigation - T1152",shape=ellipse];"mitre-enterprise-attack-course-of-action=Launchctl Mitigation - T1152" -> "mitre-enterprise-attack-attack-pattern=Launchctl - T1152" [label="mitigates",];} diff --git a/static/graphs/e333cf16-5bfa-453e-8e6a-3a4c63d6bfcc.png b/static/graphs/e333cf16-5bfa-453e-8e6a-3a4c63d6bfcc.png new file mode 100644 index 0000000..c3cc2e0 Binary files /dev/null and b/static/graphs/e333cf16-5bfa-453e-8e6a-3a4c63d6bfcc.png differ diff --git a/static/graphs/e336aeba-b61a-44e0-a0df-cd52a5839db5 b/static/graphs/e336aeba-b61a-44e0-a0df-cd52a5839db5 new file mode 100644 index 0000000..32db006 --- /dev/null +++ b/static/graphs/e336aeba-b61a-44e0-a0df-cd52a5839db5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];"tool=poisonivy" -> "rat=PoisonIvy" [label="similar",dir="both"];"tool=poisonivy" -> "mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="similar",dir="both"];"tool=poisonivy" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"tool=poisonivy" -> "tool=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];} diff --git a/static/graphs/e336aeba-b61a-44e0-a0df-cd52a5839db5.png b/static/graphs/e336aeba-b61a-44e0-a0df-cd52a5839db5.png new file mode 100644 index 0000000..3afa626 Binary files /dev/null and b/static/graphs/e336aeba-b61a-44e0-a0df-cd52a5839db5.png differ diff --git a/static/graphs/e38b8876-5780-4574-9adf-304e9d659bdb b/static/graphs/e38b8876-5780-4574-9adf-304e9d659bdb new file mode 100644 index 0000000..c5f23f3 --- /dev/null +++ b/static/graphs/e38b8876-5780-4574-9adf-304e9d659bdb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Apocalypse" [label="ransomware\nApocalypse",shape=box,style=filled,color=deepskyblue];"ransomware=Apocalypse" -> "rat=Apocalypse" [label="similar",dir="both"];"ransomware=Apocalypse" -> "malpedia=Apocalypse" [label="similar",dir="both"];"rat=Apocalypse" [label="rat\nApocalypse",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e38b8876-5780-4574-9adf-304e9d659bdb.png b/static/graphs/e38b8876-5780-4574-9adf-304e9d659bdb.png new file mode 100644 index 0000000..d8eaacf Binary files /dev/null and b/static/graphs/e38b8876-5780-4574-9adf-304e9d659bdb.png differ diff --git a/static/graphs/e3e91fe2-c7ce-11e8-8e85-6bc15cd2a63c b/static/graphs/e3e91fe2-c7ce-11e8-8e85-6bc15cd2a63c new file mode 100644 index 0000000..40022fe --- /dev/null +++ b/static/graphs/e3e91fe2-c7ce-11e8-8e85-6bc15cd2a63c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Persirai" [label="botnet\nPersirai",shape=box,style=filled,color=deepskyblue];"botnet=Persirai" -> "malpedia=Persirai" [label="similar",dir="both"];} diff --git a/static/graphs/e3e91fe2-c7ce-11e8-8e85-6bc15cd2a63c.png b/static/graphs/e3e91fe2-c7ce-11e8-8e85-6bc15cd2a63c.png new file mode 100644 index 0000000..2cc540d Binary files /dev/null and b/static/graphs/e3e91fe2-c7ce-11e8-8e85-6bc15cd2a63c.png differ diff --git a/static/graphs/e400b6c5-77cf-453d-ba0f-44575583ac6c b/static/graphs/e400b6c5-77cf-453d-ba0f-44575583ac6c new file mode 100644 index 0000000..d23ae16 --- /dev/null +++ b/static/graphs/e400b6c5-77cf-453d-ba0f-44575583ac6c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=GALLIUM" [label="threat-actor\nGALLIUM",shape=octagon,style=filled,color=indianred1];"threat-actor=GALLIUM" -> "threat-actor=Operation Soft Cell" [label="similar",dir="both"];"threat-actor=Operation Soft Cell" [label="threat-actor\nOperation Soft Cell",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/e400b6c5-77cf-453d-ba0f-44575583ac6c.png b/static/graphs/e400b6c5-77cf-453d-ba0f-44575583ac6c.png new file mode 100644 index 0000000..cb4a762 Binary files /dev/null and b/static/graphs/e400b6c5-77cf-453d-ba0f-44575583ac6c.png differ diff --git a/static/graphs/e476bbab-662a-4318-9b71-9d1862baf727 b/static/graphs/e476bbab-662a-4318-9b71-9d1862baf727 new file mode 100644 index 0000000..c2e8f48 --- /dev/null +++ b/static/graphs/e476bbab-662a-4318-9b71-9d1862baf727 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Vulnerable:DDoS amplifier" [label="rsit\nVulnerable:DDoS amplifier",shape=ellipse];} diff --git a/static/graphs/e476bbab-662a-4318-9b71-9d1862baf727.png b/static/graphs/e476bbab-662a-4318-9b71-9d1862baf727.png new file mode 100644 index 0000000..5759c07 Binary files /dev/null and b/static/graphs/e476bbab-662a-4318-9b71-9d1862baf727.png differ diff --git a/static/graphs/e48df773-7c95-4a4c-ba70-ea3d15900148 b/static/graphs/e48df773-7c95-4a4c-ba70-ea3d15900148 new file mode 100644 index 0000000..7f6a9c8 --- /dev/null +++ b/static/graphs/e48df773-7c95-4a4c-ba70-ea3d15900148 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/e48df773-7c95-4a4c-ba70-ea3d15900148.png b/static/graphs/e48df773-7c95-4a4c-ba70-ea3d15900148.png new file mode 100644 index 0000000..8c2b520 Binary files /dev/null and b/static/graphs/e48df773-7c95-4a4c-ba70-ea3d15900148.png differ diff --git a/static/graphs/e51398e6-53dc-4e9f-a323-e54683d8672b b/static/graphs/e51398e6-53dc-4e9f-a323-e54683d8672b new file mode 100644 index 0000000..a8a8071 --- /dev/null +++ b/static/graphs/e51398e6-53dc-4e9f-a323-e54683d8672b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Compromise 3rd party infrastructure to support delivery - PRE-T1111" [label="mitre-pre-attack-attack-pattern\nCompromise 3rd party infrastructure to support delivery - PRE-T1111",shape=ellipse];"mitre-pre-attack-attack-pattern=Compromise 3rd party infrastructure to support delivery - PRE-T1111" -> "mitre-pre-attack-attack-pattern=Compromise 3rd party infrastructure to support delivery - PRE-T1089" [label="related-to",];"mitre-pre-attack-attack-pattern=Compromise 3rd party infrastructure to support delivery - PRE-T1089" [label="mitre-pre-attack-attack-pattern\nCompromise 3rd party infrastructure to support delivery - PRE-T1089",shape=ellipse];"mitre-pre-attack-attack-pattern=Compromise 3rd party infrastructure to support delivery - PRE-T1089" -> "mitre-pre-attack-attack-pattern=Compromise 3rd party infrastructure to support delivery - PRE-T1111" [label="related-to",];} diff --git a/static/graphs/e51398e6-53dc-4e9f-a323-e54683d8672b.png b/static/graphs/e51398e6-53dc-4e9f-a323-e54683d8672b.png new file mode 100644 index 0000000..4e0a25a Binary files /dev/null and b/static/graphs/e51398e6-53dc-4e9f-a323-e54683d8672b.png differ diff --git a/static/graphs/e5164428-03ca-4336-a9a7-4d9ea1417e59 b/static/graphs/e5164428-03ca-4336-a9a7-4d9ea1417e59 new file mode 100644 index 0000000..035e41b --- /dev/null +++ b/static/graphs/e5164428-03ca-4336-a9a7-4d9ea1417e59 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Acquire or compromise 3rd party signing certificates - PRE-T1087" [label="mitre-pre-attack-attack-pattern\nAcquire or compromise 3rd party signing certificates - PRE-T1087",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire or compromise 3rd party signing certificates - PRE-T1087" -> "mitre-pre-attack-attack-pattern=Acquire or compromise 3rd party signing certificates - PRE-T1109" [label="related-to",];"mitre-pre-attack-attack-pattern=Acquire or compromise 3rd party signing certificates - PRE-T1109" [label="mitre-pre-attack-attack-pattern\nAcquire or compromise 3rd party signing certificates - PRE-T1109",shape=ellipse];"mitre-pre-attack-attack-pattern=Acquire or compromise 3rd party signing certificates - PRE-T1109" -> "mitre-pre-attack-attack-pattern=Acquire or compromise 3rd party signing certificates - PRE-T1087" [label="related-to",];} diff --git a/static/graphs/e5164428-03ca-4336-a9a7-4d9ea1417e59.png b/static/graphs/e5164428-03ca-4336-a9a7-4d9ea1417e59.png new file mode 100644 index 0000000..e3c842c Binary files /dev/null and b/static/graphs/e5164428-03ca-4336-a9a7-4d9ea1417e59.png differ diff --git a/static/graphs/e547ed6a-f1ca-40df-8613-2ce27927f145 b/static/graphs/e547ed6a-f1ca-40df-8613-2ce27927f145 new file mode 100644 index 0000000..1dbd156 --- /dev/null +++ b/static/graphs/e547ed6a-f1ca-40df-8613-2ce27927f145 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Exfiltration Over Physical Medium Mitigation - T1052" [label="mitre-enterprise-attack-course-of-action\nExfiltration Over Physical Medium Mitigation - T1052",shape=ellipse];"mitre-enterprise-attack-course-of-action=Exfiltration Over Physical Medium Mitigation - T1052" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Physical Medium - T1052" [label="mitigates",];} diff --git a/static/graphs/e547ed6a-f1ca-40df-8613-2ce27927f145.png b/static/graphs/e547ed6a-f1ca-40df-8613-2ce27927f145.png new file mode 100644 index 0000000..657c1c6 Binary files /dev/null and b/static/graphs/e547ed6a-f1ca-40df-8613-2ce27927f145.png differ diff --git a/static/graphs/e5a9a2ec-348e-4a2f-98dd-16c3e8845576 b/static/graphs/e5a9a2ec-348e-4a2f-98dd-16c3e8845576 new file mode 100644 index 0000000..c877968 --- /dev/null +++ b/static/graphs/e5a9a2ec-348e-4a2f-98dd-16c3e8845576 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=SLOWDRIFT" [label="tool\nSLOWDRIFT",shape=box,style=filled,color=deepskyblue];"tool=SLOWDRIFT" -> "mitre-enterprise-attack-malware=SLOWDRIFT - S0218" [label="similar",dir="both"];"mitre-enterprise-attack-malware=SLOWDRIFT - S0218" [label="mitre-enterprise-attack-malware\nSLOWDRIFT - S0218",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=SLOWDRIFT - S0218" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];} diff --git a/static/graphs/e5a9a2ec-348e-4a2f-98dd-16c3e8845576.png b/static/graphs/e5a9a2ec-348e-4a2f-98dd-16c3e8845576.png new file mode 100644 index 0000000..f9b16e1 Binary files /dev/null and b/static/graphs/e5a9a2ec-348e-4a2f-98dd-16c3e8845576.png differ diff --git a/static/graphs/e5f7bb36-c982-4f5a-9b29-ab73d2c5f70e b/static/graphs/e5f7bb36-c982-4f5a-9b29-ab73d2c5f70e new file mode 100644 index 0000000..3bc5e24 --- /dev/null +++ b/static/graphs/e5f7bb36-c982-4f5a-9b29-ab73d2c5f70e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Hworm" [label="tool\nHworm",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e5f7bb36-c982-4f5a-9b29-ab73d2c5f70e.png b/static/graphs/e5f7bb36-c982-4f5a-9b29-ab73d2c5f70e.png new file mode 100644 index 0000000..3d20d1d Binary files /dev/null and b/static/graphs/e5f7bb36-c982-4f5a-9b29-ab73d2c5f70e.png differ diff --git a/static/graphs/e6085ce0-af6d-41f7-8bcb-7f2eed246941 b/static/graphs/e6085ce0-af6d-41f7-8bcb-7f2eed246941 new file mode 100644 index 0000000..8d1749d --- /dev/null +++ b/static/graphs/e6085ce0-af6d-41f7-8bcb-7f2eed246941 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Shiz" [label="tool\nShiz",shape=box,style=filled,color=deepskyblue];"tool=Shiz" -> "tool=Shifu" [label="similar",dir="both"];"tool=Shifu" [label="tool\nShifu",shape=box,style=filled,color=deepskyblue];"tool=Shifu" -> "malpedia=Shifu" [label="similar",dir="both"];} diff --git a/static/graphs/e6085ce0-af6d-41f7-8bcb-7f2eed246941.png b/static/graphs/e6085ce0-af6d-41f7-8bcb-7f2eed246941.png new file mode 100644 index 0000000..7881db4 Binary files /dev/null and b/static/graphs/e6085ce0-af6d-41f7-8bcb-7f2eed246941.png differ diff --git a/static/graphs/e6201dc3-01a7-40c5-ba72-02fa470ada53 b/static/graphs/e6201dc3-01a7-40c5-ba72-02fa470ada53 new file mode 100644 index 0000000..8b9c47f --- /dev/null +++ b/static/graphs/e6201dc3-01a7-40c5-ba72-02fa470ada53 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"exploit-kit=BlackHole" [label="exploit-kit\nBlackHole",shape=box,style=filled,color=deepskyblue];"exploit-kit=BlackHole" -> "rat=BlackHole" [label="similar",dir="both"];"rat=BlackHole" [label="rat\nBlackHole",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e6201dc3-01a7-40c5-ba72-02fa470ada53.png b/static/graphs/e6201dc3-01a7-40c5-ba72-02fa470ada53.png new file mode 100644 index 0000000..7370d5c Binary files /dev/null and b/static/graphs/e6201dc3-01a7-40c5-ba72-02fa470ada53.png differ diff --git a/static/graphs/e669bb87-f773-4c7b-bfcc-a9ffebfdd8d4 b/static/graphs/e669bb87-f773-4c7b-bfcc-a9ffebfdd8d4 new file mode 100644 index 0000000..39db44d --- /dev/null +++ b/static/graphs/e669bb87-f773-4c7b-bfcc-a9ffebfdd8d4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=HIDEDRV - S0135" [label="mitre-enterprise-attack-malware\nHIDEDRV - S0135",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=HIDEDRV - S0135" -> "mitre-enterprise-attack-attack-pattern=Rootkit - T1014" [label="uses",];} diff --git a/static/graphs/e669bb87-f773-4c7b-bfcc-a9ffebfdd8d4.png b/static/graphs/e669bb87-f773-4c7b-bfcc-a9ffebfdd8d4.png new file mode 100644 index 0000000..135ff70 Binary files /dev/null and b/static/graphs/e669bb87-f773-4c7b-bfcc-a9ffebfdd8d4.png differ diff --git a/static/graphs/e683cd91-40b4-4e1c-be25-34a27610a22e b/static/graphs/e683cd91-40b4-4e1c-be25-34a27610a22e new file mode 100644 index 0000000..d29a429 --- /dev/null +++ b/static/graphs/e683cd91-40b4-4e1c-be25-34a27610a22e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=TinyNuke" [label="banker\nTinyNuke",shape=box,style=filled,color=deepskyblue];"banker=TinyNuke" -> "mitre-mobile-attack-tool=Xbot - MOB-S0014" [label="similar",dir="both"];"banker=TinyNuke" -> "malpedia=Xbot" [label="similar",dir="both"];"banker=TinyNuke" -> "malpedia=TinyNuke" [label="similar",dir="both"];"mitre-mobile-attack-tool=Xbot - MOB-S0014" [label="mitre-mobile-attack-tool\nXbot - MOB-S0014",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-tool=Xbot - MOB-S0014" -> "mitre-mobile-attack-attack-pattern=Capture SMS Messages - MOB-T1015" [label="uses",];} diff --git a/static/graphs/e683cd91-40b4-4e1c-be25-34a27610a22e.png b/static/graphs/e683cd91-40b4-4e1c-be25-34a27610a22e.png new file mode 100644 index 0000000..4e358ec Binary files /dev/null and b/static/graphs/e683cd91-40b4-4e1c-be25-34a27610a22e.png differ diff --git a/static/graphs/e69f9836-873a-43d3-92a8-97ab783a4171 b/static/graphs/e69f9836-873a-43d3-92a8-97ab783a4171 new file mode 100644 index 0000000..0521952 --- /dev/null +++ b/static/graphs/e69f9836-873a-43d3-92a8-97ab783a4171 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Ragnar Locker" [label="ransomware\nRagnar Locker",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e69f9836-873a-43d3-92a8-97ab783a4171.png b/static/graphs/e69f9836-873a-43d3-92a8-97ab783a4171.png new file mode 100644 index 0000000..6e875ca Binary files /dev/null and b/static/graphs/e69f9836-873a-43d3-92a8-97ab783a4171.png differ diff --git a/static/graphs/e6ca2820-a564-4b74-b42a-b6bdf052e5b6 b/static/graphs/e6ca2820-a564-4b74-b42a-b6bdf052e5b6 new file mode 100644 index 0000000..44cdb78 --- /dev/null +++ b/static/graphs/e6ca2820-a564-4b74-b42a-b6bdf052e5b6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Obfuscate infrastructure - PRE-T1086" [label="mitre-pre-attack-attack-pattern\nObfuscate infrastructure - PRE-T1086",shape=ellipse];"mitre-pre-attack-attack-pattern=Obfuscate infrastructure - PRE-T1086" -> "mitre-pre-attack-attack-pattern=Obfuscate infrastructure - PRE-T1108" [label="related-to",];"mitre-pre-attack-attack-pattern=Obfuscate infrastructure - PRE-T1108" [label="mitre-pre-attack-attack-pattern\nObfuscate infrastructure - PRE-T1108",shape=ellipse];"mitre-pre-attack-attack-pattern=Obfuscate infrastructure - PRE-T1108" -> "mitre-pre-attack-attack-pattern=Obfuscate infrastructure - PRE-T1086" [label="related-to",];} diff --git a/static/graphs/e6ca2820-a564-4b74-b42a-b6bdf052e5b6.png b/static/graphs/e6ca2820-a564-4b74-b42a-b6bdf052e5b6.png new file mode 100644 index 0000000..17b611b Binary files /dev/null and b/static/graphs/e6ca2820-a564-4b74-b42a-b6bdf052e5b6.png differ diff --git a/static/graphs/e6ef745b-077f-42e1-a37d-29eecff9c754 b/static/graphs/e6ef745b-077f-42e1-a37d-29eecff9c754 new file mode 100644 index 0000000..28bcb9c --- /dev/null +++ b/static/graphs/e6ef745b-077f-42e1-a37d-29eecff9c754 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=CozyCar - S0046" [label="mitre-enterprise-attack-malware\nCozyCar - S0046",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CozyCar - S0046" -> "mitre-enterprise-attack-attack-pattern=Scheduled Task - T1053" [label="uses",];} diff --git a/static/graphs/e6ef745b-077f-42e1-a37d-29eecff9c754.png b/static/graphs/e6ef745b-077f-42e1-a37d-29eecff9c754.png new file mode 100644 index 0000000..4807187 Binary files /dev/null and b/static/graphs/e6ef745b-077f-42e1-a37d-29eecff9c754.png differ diff --git a/static/graphs/e7080bce-99b5-4615-a798-a192ed89bd5a b/static/graphs/e7080bce-99b5-4615-a798-a192ed89bd5a new file mode 100644 index 0000000..aeb67cb --- /dev/null +++ b/static/graphs/e7080bce-99b5-4615-a798-a192ed89bd5a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"stealer=Nocturnal Stealer" [label="stealer\nNocturnal Stealer",shape=box,style=filled,color=deepskyblue];"stealer=Nocturnal Stealer" -> "malpedia=Nocturnal Stealer" [label="similar",dir="both"];} diff --git a/static/graphs/e7080bce-99b5-4615-a798-a192ed89bd5a.png b/static/graphs/e7080bce-99b5-4615-a798-a192ed89bd5a.png new file mode 100644 index 0000000..0a1c305 Binary files /dev/null and b/static/graphs/e7080bce-99b5-4615-a798-a192ed89bd5a.png differ diff --git a/static/graphs/e721809b-2785-4ce3-b95a-7fde2762f736 b/static/graphs/e721809b-2785-4ce3-b95a-7fde2762f736 new file mode 100644 index 0000000..fdd34a3 --- /dev/null +++ b/static/graphs/e721809b-2785-4ce3-b95a-7fde2762f736 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Kraken" [label="botnet\nKraken",shape=box,style=filled,color=deepskyblue];"botnet=Kraken" -> "botnet=Marina Botnet" [label="similar",dir="both"];"botnet=Marina Botnet" [label="botnet\nMarina Botnet",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e721809b-2785-4ce3-b95a-7fde2762f736.png b/static/graphs/e721809b-2785-4ce3-b95a-7fde2762f736.png new file mode 100644 index 0000000..2af639d Binary files /dev/null and b/static/graphs/e721809b-2785-4ce3-b95a-7fde2762f736.png differ diff --git a/static/graphs/e77cf495-632a-4459-aad1-cdf29d73683f b/static/graphs/e77cf495-632a-4459-aad1-cdf29d73683f new file mode 100644 index 0000000..5761464 --- /dev/null +++ b/static/graphs/e77cf495-632a-4459-aad1-cdf29d73683f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Satori" [label="botnet\nSatori",shape=box,style=filled,color=deepskyblue];"botnet=Satori" -> "tool=Satori" [label="similar",dir="both"];"botnet=Satori" -> "malpedia=Satori" [label="similar",dir="both"];"tool=Satori" [label="tool\nSatori",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e77cf495-632a-4459-aad1-cdf29d73683f.png b/static/graphs/e77cf495-632a-4459-aad1-cdf29d73683f.png new file mode 100644 index 0000000..abd304c Binary files /dev/null and b/static/graphs/e77cf495-632a-4459-aad1-cdf29d73683f.png differ diff --git a/static/graphs/e811ff6a-4cef-4856-a6ae-a7daf9ed39ae b/static/graphs/e811ff6a-4cef-4856-a6ae-a7daf9ed39ae new file mode 100644 index 0000000..5ac74f3 --- /dev/null +++ b/static/graphs/e811ff6a-4cef-4856-a6ae-a7daf9ed39ae @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Pasam - S0208" [label="mitre-enterprise-attack-malware\nPasam - S0208",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Pasam - S0208" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];} diff --git a/static/graphs/e811ff6a-4cef-4856-a6ae-a7daf9ed39ae.png b/static/graphs/e811ff6a-4cef-4856-a6ae-a7daf9ed39ae.png new file mode 100644 index 0000000..b460cca Binary files /dev/null and b/static/graphs/e811ff6a-4cef-4856-a6ae-a7daf9ed39ae.png differ diff --git a/static/graphs/e8268361-a599-4e45-bd3f-71c8c7e700c0 b/static/graphs/e8268361-a599-4e45-bd3f-71c8c7e700c0 new file mode 100644 index 0000000..339618e --- /dev/null +++ b/static/graphs/e8268361-a599-4e45-bd3f-71c8c7e700c0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=httpclient - S0068" [label="mitre-enterprise-attack-malware\nhttpclient - S0068",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=httpclient - S0068" -> "mitre-enterprise-attack-attack-pattern=Custom Cryptographic Protocol - T1024" [label="uses",];} diff --git a/static/graphs/e8268361-a599-4e45-bd3f-71c8c7e700c0.png b/static/graphs/e8268361-a599-4e45-bd3f-71c8c7e700c0.png new file mode 100644 index 0000000..309fcb3 Binary files /dev/null and b/static/graphs/e8268361-a599-4e45-bd3f-71c8c7e700c0.png differ diff --git a/static/graphs/e829ee51-1caf-4665-ba15-7f8979634124 b/static/graphs/e829ee51-1caf-4665-ba15-7f8979634124 new file mode 100644 index 0000000..e7cde5c --- /dev/null +++ b/static/graphs/e829ee51-1caf-4665-ba15-7f8979634124 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=Interconnection Filtering - MOB-M1014" [label="mitre-mobile-attack-course-of-action\nInterconnection Filtering - MOB-M1014",shape=ellipse];"mitre-mobile-attack-course-of-action=Interconnection Filtering - MOB-M1014" -> "mitre-mobile-attack-attack-pattern=Exploit SS7 to Redirect Phone Calls/SMS - MOB-T1052" [label="mitigates",];"mitre-mobile-attack-course-of-action=Interconnection Filtering - MOB-M1014" -> "mitre-mobile-attack-attack-pattern=Exploit SS7 to Track Device Location - MOB-T1053" [label="mitigates",];} diff --git a/static/graphs/e829ee51-1caf-4665-ba15-7f8979634124.png b/static/graphs/e829ee51-1caf-4665-ba15-7f8979634124.png new file mode 100644 index 0000000..2eb1f74 Binary files /dev/null and b/static/graphs/e829ee51-1caf-4665-ba15-7f8979634124.png differ diff --git a/static/graphs/e83d1296-027a-4f30-98e0-19622967d5c4 b/static/graphs/e83d1296-027a-4f30-98e0-19622967d5c4 new file mode 100644 index 0000000..569d07f --- /dev/null +++ b/static/graphs/e83d1296-027a-4f30-98e0-19622967d5c4 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=CrackMapExec" [label="tool\nCrackMapExec",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e83d1296-027a-4f30-98e0-19622967d5c4.png b/static/graphs/e83d1296-027a-4f30-98e0-19622967d5c4.png new file mode 100644 index 0000000..6a387c1 Binary files /dev/null and b/static/graphs/e83d1296-027a-4f30-98e0-19622967d5c4.png differ diff --git a/static/graphs/e8545794-b98c-492b-a5b3-4b5a02682e37 b/static/graphs/e8545794-b98c-492b-a5b3-4b5a02682e37 new file mode 100644 index 0000000..62b9a57 --- /dev/null +++ b/static/graphs/e8545794-b98c-492b-a5b3-4b5a02682e37 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=POWERSTATS - S0223" [label="mitre-enterprise-attack-malware\nPOWERSTATS - S0223",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=POWERSTATS - S0223" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];} diff --git a/static/graphs/e8545794-b98c-492b-a5b3-4b5a02682e37.png b/static/graphs/e8545794-b98c-492b-a5b3-4b5a02682e37.png new file mode 100644 index 0000000..c5fbd1d Binary files /dev/null and b/static/graphs/e8545794-b98c-492b-a5b3-4b5a02682e37.png differ diff --git a/static/graphs/e878d24d-f122-48c4-930c-f6b6d5f0ee28 b/static/graphs/e878d24d-f122-48c4-930c-f6b6d5f0ee28 new file mode 100644 index 0000000..4e894dc --- /dev/null +++ b/static/graphs/e878d24d-f122-48c4-930c-f6b6d5f0ee28 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Zeus" [label="botnet\nZeus",shape=box,style=filled,color=deepskyblue];"botnet=Zeus" -> "tool=Zeus" [label="similar",dir="both"];"botnet=Zeus" -> "banker=Zeus" [label="similar",dir="both"];"botnet=Zeus" -> "malpedia=Zeus" [label="similar",dir="both"];"banker=Zeus" [label="banker\nZeus",shape=box,style=filled,color=deepskyblue];"tool=Zeus" [label="tool\nZeus",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e878d24d-f122-48c4-930c-f6b6d5f0ee28.png b/static/graphs/e878d24d-f122-48c4-930c-f6b6d5f0ee28.png new file mode 100644 index 0000000..907d4dc Binary files /dev/null and b/static/graphs/e878d24d-f122-48c4-930c-f6b6d5f0ee28.png differ diff --git a/static/graphs/e8af6388-6575-4812-94a8-9df1567294c5 b/static/graphs/e8af6388-6575-4812-94a8-9df1567294c5 new file mode 100644 index 0000000..ee68980 --- /dev/null +++ b/static/graphs/e8af6388-6575-4812-94a8-9df1567294c5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Bad Rabbit" [label="ransomware\nBad Rabbit",shape=box,style=filled,color=deepskyblue];"ransomware=Bad Rabbit" -> "malpedia=EternalPetya" [label="similar",dir="both"];"ransomware=Bad Rabbit" -> "tool=NotPetya" [label="similar",dir="both"];"tool=NotPetya" [label="tool\nNotPetya",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e8af6388-6575-4812-94a8-9df1567294c5.png b/static/graphs/e8af6388-6575-4812-94a8-9df1567294c5.png new file mode 100644 index 0000000..4e050f9 Binary files /dev/null and b/static/graphs/e8af6388-6575-4812-94a8-9df1567294c5.png differ diff --git a/static/graphs/e8d22ec6-2236-48de-954b-974d17492782 b/static/graphs/e8d22ec6-2236-48de-954b-974d17492782 new file mode 100644 index 0000000..c9a1180 --- /dev/null +++ b/static/graphs/e8d22ec6-2236-48de-954b-974d17492782 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Two-Factor Authentication Interception Mitigation - T1111" [label="mitre-enterprise-attack-course-of-action\nTwo-Factor Authentication Interception Mitigation - T1111",shape=ellipse];"mitre-enterprise-attack-course-of-action=Two-Factor Authentication Interception Mitigation - T1111" -> "mitre-enterprise-attack-attack-pattern=Two-Factor Authentication Interception - T1111" [label="mitigates",];} diff --git a/static/graphs/e8d22ec6-2236-48de-954b-974d17492782.png b/static/graphs/e8d22ec6-2236-48de-954b-974d17492782.png new file mode 100644 index 0000000..4aa9510 Binary files /dev/null and b/static/graphs/e8d22ec6-2236-48de-954b-974d17492782.png differ diff --git a/static/graphs/e944670c-d03a-4e93-a21c-b3d4c53ec4c9 b/static/graphs/e944670c-d03a-4e93-a21c-b3d4c53ec4c9 new file mode 100644 index 0000000..7fba6eb --- /dev/null +++ b/static/graphs/e944670c-d03a-4e93-a21c-b3d4c53ec4c9 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=Caution with Device Administrator Access - MOB-M1007" [label="mitre-mobile-attack-course-of-action\nCaution with Device Administrator Access - MOB-M1007",shape=ellipse];"mitre-mobile-attack-course-of-action=Caution with Device Administrator Access - MOB-M1007" -> "mitre-mobile-attack-attack-pattern=Wipe Device Data - MOB-T1050" [label="mitigates",];} diff --git a/static/graphs/e944670c-d03a-4e93-a21c-b3d4c53ec4c9.png b/static/graphs/e944670c-d03a-4e93-a21c-b3d4c53ec4c9.png new file mode 100644 index 0000000..d7196b8 Binary files /dev/null and b/static/graphs/e944670c-d03a-4e93-a21c-b3d4c53ec4c9.png differ diff --git a/static/graphs/e9595678-d269-469e-ae6b-75e49259de63 b/static/graphs/e9595678-d269-469e-ae6b-75e49259de63 new file mode 100644 index 0000000..963ea04 --- /dev/null +++ b/static/graphs/e9595678-d269-469e-ae6b-75e49259de63 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=BADNEWS - S0128" [label="mitre-enterprise-attack-malware\nBADNEWS - S0128",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BADNEWS - S0128" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];} diff --git a/static/graphs/e9595678-d269-469e-ae6b-75e49259de63.png b/static/graphs/e9595678-d269-469e-ae6b-75e49259de63.png new file mode 100644 index 0000000..d53cf26 Binary files /dev/null and b/static/graphs/e9595678-d269-469e-ae6b-75e49259de63.png differ diff --git a/static/graphs/e95dd1ba-7485-4c02-bf2e-14beedbcf053 b/static/graphs/e95dd1ba-7485-4c02-bf2e-14beedbcf053 new file mode 100644 index 0000000..2958bb3 --- /dev/null +++ b/static/graphs/e95dd1ba-7485-4c02-bf2e-14beedbcf053 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Vawtrak" [label="tool\nVawtrak",shape=box,style=filled,color=deepskyblue];"tool=Vawtrak" -> "banker=Vawtrak" [label="similar",dir="both"];"tool=Vawtrak" -> "malpedia=Vawtrak" [label="similar",dir="both"];"banker=Vawtrak" [label="banker\nVawtrak",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/e95dd1ba-7485-4c02-bf2e-14beedbcf053.png b/static/graphs/e95dd1ba-7485-4c02-bf2e-14beedbcf053.png new file mode 100644 index 0000000..b89702f Binary files /dev/null and b/static/graphs/e95dd1ba-7485-4c02-bf2e-14beedbcf053.png differ diff --git a/static/graphs/e9e9bfe2-76f4-4870-a2a1-b7af89808613 b/static/graphs/e9e9bfe2-76f4-4870-a2a1-b7af89808613 new file mode 100644 index 0000000..f55251e --- /dev/null +++ b/static/graphs/e9e9bfe2-76f4-4870-a2a1-b7af89808613 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Linfo - S0211" [label="mitre-enterprise-attack-malware\nLinfo - S0211",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Linfo - S0211" -> "mitre-enterprise-attack-attack-pattern=Data from Local System - T1005" [label="uses",];} diff --git a/static/graphs/e9e9bfe2-76f4-4870-a2a1-b7af89808613.png b/static/graphs/e9e9bfe2-76f4-4870-a2a1-b7af89808613.png new file mode 100644 index 0000000..0fd853c Binary files /dev/null and b/static/graphs/e9e9bfe2-76f4-4870-a2a1-b7af89808613.png differ diff --git a/static/graphs/ea3a8c25-4adb-4538-bf11-55259bdba15f b/static/graphs/ea3a8c25-4adb-4538-bf11-55259bdba15f new file mode 100644 index 0000000..9e8b2e8 --- /dev/null +++ b/static/graphs/ea3a8c25-4adb-4538-bf11-55259bdba15f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Dendroid" [label="rat\nDendroid",shape=box,style=filled,color=deepskyblue];"rat=Dendroid" -> "mitre-mobile-attack-malware=Dendroid - MOB-S0017" [label="similar",dir="both"];"mitre-mobile-attack-malware=Dendroid - MOB-S0017" [label="mitre-mobile-attack-malware\nDendroid - MOB-S0017",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Dendroid - MOB-S0017" -> "mitre-mobile-attack-attack-pattern=Microphone or Camera Recordings - MOB-T1032" [label="uses",];} diff --git a/static/graphs/ea3a8c25-4adb-4538-bf11-55259bdba15f.png b/static/graphs/ea3a8c25-4adb-4538-bf11-55259bdba15f.png new file mode 100644 index 0000000..9c6c1ac Binary files /dev/null and b/static/graphs/ea3a8c25-4adb-4538-bf11-55259bdba15f.png differ diff --git a/static/graphs/ea68b5a8-6f9e-441a-a308-5e4fda8dbab6 b/static/graphs/ea68b5a8-6f9e-441a-a308-5e4fda8dbab6 new file mode 100644 index 0000000..df8d520 --- /dev/null +++ b/static/graphs/ea68b5a8-6f9e-441a-a308-5e4fda8dbab6 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Exte" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ea68b5a8-6f9e-441a-a308-5e4fda8dbab6.png b/static/graphs/ea68b5a8-6f9e-441a-a308-5e4fda8dbab6.png new file mode 100644 index 0000000..8b566f5 Binary files /dev/null and b/static/graphs/ea68b5a8-6f9e-441a-a308-5e4fda8dbab6.png differ diff --git a/static/graphs/ea727e26-b3de-44f8-86c5-11a912c7a8aa b/static/graphs/ea727e26-b3de-44f8-86c5-11a912c7a8aa new file mode 100644 index 0000000..4053e26 --- /dev/null +++ b/static/graphs/ea727e26-b3de-44f8-86c5-11a912c7a8aa @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=SpyNote" [label="rat\nSpyNote",shape=box,style=filled,color=deepskyblue];"rat=SpyNote" -> "malpedia=SpyNote" [label="similar",dir="both"];} diff --git a/static/graphs/ea727e26-b3de-44f8-86c5-11a912c7a8aa.png b/static/graphs/ea727e26-b3de-44f8-86c5-11a912c7a8aa.png new file mode 100644 index 0000000..ce2d883 Binary files /dev/null and b/static/graphs/ea727e26-b3de-44f8-86c5-11a912c7a8aa.png differ diff --git a/static/graphs/eacd1efe-ee30-4b03-b58f-5b3b1adfe45d b/static/graphs/eacd1efe-ee30-4b03-b58f-5b3b1adfe45d new file mode 100644 index 0000000..05aed92 --- /dev/null +++ b/static/graphs/eacd1efe-ee30-4b03-b58f-5b3b1adfe45d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-pre-attack-attack-pattern=Friend/Follow/Connect to targets of interest - PRE-T1141" [label="mitre-pre-attack-attack-pattern\nFriend/Follow/Connect to targets of interest - PRE-T1141",shape=ellipse];"mitre-pre-attack-attack-pattern=Friend/Follow/Connect to targets of interest - PRE-T1141" -> "mitre-pre-attack-attack-pattern=Friend/Follow/Connect to targets of interest - PRE-T1121" [label="related-to",];"mitre-pre-attack-attack-pattern=Friend/Follow/Connect to targets of interest - PRE-T1121" [label="mitre-pre-attack-attack-pattern\nFriend/Follow/Connect to targets of interest - PRE-T1121",shape=ellipse];"mitre-pre-attack-attack-pattern=Friend/Follow/Connect to targets of interest - PRE-T1121" -> "mitre-pre-attack-attack-pattern=Friend/Follow/Connect to targets of interest - PRE-T1141" [label="related-to",];} diff --git a/static/graphs/eacd1efe-ee30-4b03-b58f-5b3b1adfe45d.png b/static/graphs/eacd1efe-ee30-4b03-b58f-5b3b1adfe45d.png new file mode 100644 index 0000000..67f10de Binary files /dev/null and b/static/graphs/eacd1efe-ee30-4b03-b58f-5b3b1adfe45d.png differ diff --git a/static/graphs/ec418d1b-4963-439f-b055-f914737ef362 b/static/graphs/ec418d1b-4963-439f-b055-f914737ef362 new file mode 100644 index 0000000..b2b51d0 --- /dev/null +++ b/static/graphs/ec418d1b-4963-439f-b055-f914737ef362 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=InstallUtil Mitigation - T1118" [label="mitre-enterprise-attack-course-of-action\nInstallUtil Mitigation - T1118",shape=ellipse];"mitre-enterprise-attack-course-of-action=InstallUtil Mitigation - T1118" -> "mitre-enterprise-attack-attack-pattern=InstallUtil - T1118" [label="mitigates",];} diff --git a/static/graphs/ec418d1b-4963-439f-b055-f914737ef362.png b/static/graphs/ec418d1b-4963-439f-b055-f914737ef362.png new file mode 100644 index 0000000..551a441 Binary files /dev/null and b/static/graphs/ec418d1b-4963-439f-b055-f914737ef362.png differ diff --git a/static/graphs/ecaef53f-a4a2-4360-b8e1-cca7b606596a b/static/graphs/ecaef53f-a4a2-4360-b8e1-cca7b606596a new file mode 100644 index 0000000..eafbbae --- /dev/null +++ b/static/graphs/ecaef53f-a4a2-4360-b8e1-cca7b606596a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Azer" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ecaef53f-a4a2-4360-b8e1-cca7b606596a.png b/static/graphs/ecaef53f-a4a2-4360-b8e1-cca7b606596a.png new file mode 100644 index 0000000..3d336bb Binary files /dev/null and b/static/graphs/ecaef53f-a4a2-4360-b8e1-cca7b606596a.png differ diff --git a/static/graphs/ed202147-4026-4330-b5bd-1e8dfa8cf7cc b/static/graphs/ed202147-4026-4330-b5bd-1e8dfa8cf7cc new file mode 100644 index 0000000..740881f --- /dev/null +++ b/static/graphs/ed202147-4026-4330-b5bd-1e8dfa8cf7cc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Modify Registry Mitigation - T1112" [label="mitre-enterprise-attack-course-of-action\nModify Registry Mitigation - T1112",shape=ellipse];"mitre-enterprise-attack-course-of-action=Modify Registry Mitigation - T1112" -> "mitre-enterprise-attack-attack-pattern=Modify Registry - T1112" [label="mitigates",];} diff --git a/static/graphs/ed202147-4026-4330-b5bd-1e8dfa8cf7cc.png b/static/graphs/ed202147-4026-4330-b5bd-1e8dfa8cf7cc.png new file mode 100644 index 0000000..3aae3e8 Binary files /dev/null and b/static/graphs/ed202147-4026-4330-b5bd-1e8dfa8cf7cc.png differ diff --git a/static/graphs/ed7d0cb1-87a6-43b4-9f46-ef1bc56d6c68 b/static/graphs/ed7d0cb1-87a6-43b4-9f46-ef1bc56d6c68 new file mode 100644 index 0000000..467d547 --- /dev/null +++ b/static/graphs/ed7d0cb1-87a6-43b4-9f46-ef1bc56d6c68 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Tor - S0183" [label="mitre-enterprise-attack-tool\nTor - S0183",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Tor - S0183" -> "mitre-enterprise-attack-attack-pattern=Multi-hop Proxy - T1188" [label="uses",];} diff --git a/static/graphs/ed7d0cb1-87a6-43b4-9f46-ef1bc56d6c68.png b/static/graphs/ed7d0cb1-87a6-43b4-9f46-ef1bc56d6c68.png new file mode 100644 index 0000000..42a9382 Binary files /dev/null and b/static/graphs/ed7d0cb1-87a6-43b4-9f46-ef1bc56d6c68.png differ diff --git a/static/graphs/ee73e375-3ac2-4ce0-b24b-74fd82d52864 b/static/graphs/ee73e375-3ac2-4ce0-b24b-74fd82d52864 new file mode 100644 index 0000000..0d29037 --- /dev/null +++ b/static/graphs/ee73e375-3ac2-4ce0-b24b-74fd82d52864 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Erebus" [label="rat\nErebus",shape=box,style=filled,color=deepskyblue];"rat=Erebus" -> "malpedia=Erebus (ELF)" [label="similar",dir="both"];} diff --git a/static/graphs/ee73e375-3ac2-4ce0-b24b-74fd82d52864.png b/static/graphs/ee73e375-3ac2-4ce0-b24b-74fd82d52864.png new file mode 100644 index 0000000..7e9154a Binary files /dev/null and b/static/graphs/ee73e375-3ac2-4ce0-b24b-74fd82d52864.png differ diff --git a/static/graphs/ee8ccb36-2596-43a3-a044-b8721dbeb2ab b/static/graphs/ee8ccb36-2596-43a3-a044-b8721dbeb2ab new file mode 100644 index 0000000..a5e2423 --- /dev/null +++ b/static/graphs/ee8ccb36-2596-43a3-a044-b8721dbeb2ab @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=DNSMessenger" [label="rat\nDNSMessenger",shape=box,style=filled,color=deepskyblue];"rat=DNSMessenger" -> "mitre-enterprise-attack-malware=TEXTMATE - S0146" [label="similar",dir="both"];"rat=DNSMessenger" -> "mitre-enterprise-attack-malware=POWERSOURCE - S0145" [label="similar",dir="both"];"rat=DNSMessenger" -> "malpedia=DNSMessenger" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TEXTMATE - S0146" [label="mitre-enterprise-attack-malware\nTEXTMATE - S0146",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TEXTMATE - S0146" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"mitre-enterprise-attack-malware=POWERSOURCE - S0145" [label="mitre-enterprise-attack-malware\nPOWERSOURCE - S0145",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=POWERSOURCE - S0145" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/ee8ccb36-2596-43a3-a044-b8721dbeb2ab.png b/static/graphs/ee8ccb36-2596-43a3-a044-b8721dbeb2ab.png new file mode 100644 index 0000000..f6a62f2 Binary files /dev/null and b/static/graphs/ee8ccb36-2596-43a3-a044-b8721dbeb2ab.png differ diff --git a/static/graphs/eead5605-0d79-4942-a6c2-efa6853cdf6b b/static/graphs/eead5605-0d79-4942-a6c2-efa6853cdf6b new file mode 100644 index 0000000..fb76af9 --- /dev/null +++ b/static/graphs/eead5605-0d79-4942-a6c2-efa6853cdf6b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Fakem RAT" [label="tool\nFakem RAT",shape=box,style=filled,color=deepskyblue];"tool=Fakem RAT" -> "malpedia=Terminator RAT" [label="similar",dir="both"];} diff --git a/static/graphs/eead5605-0d79-4942-a6c2-efa6853cdf6b.png b/static/graphs/eead5605-0d79-4942-a6c2-efa6853cdf6b.png new file mode 100644 index 0000000..b9c1462 Binary files /dev/null and b/static/graphs/eead5605-0d79-4942-a6c2-efa6853cdf6b.png differ diff --git a/static/graphs/eedcf785-d011-4e17-96c4-6ff39138ada0 b/static/graphs/eedcf785-d011-4e17-96c4-6ff39138ada0 new file mode 100644 index 0000000..1986c91 --- /dev/null +++ b/static/graphs/eedcf785-d011-4e17-96c4-6ff39138ada0 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=NeD Worm" [label="tool\nNeD Worm",shape=box,style=filled,color=deepskyblue];"tool=NeD Worm" -> "mitre-enterprise-attack-malware=DustySky - S0062" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DustySky - S0062" [label="mitre-enterprise-attack-malware\nDustySky - S0062",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DustySky - S0062" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];} diff --git a/static/graphs/eedcf785-d011-4e17-96c4-6ff39138ada0.png b/static/graphs/eedcf785-d011-4e17-96c4-6ff39138ada0.png new file mode 100644 index 0000000..aca9479 Binary files /dev/null and b/static/graphs/eedcf785-d011-4e17-96c4-6ff39138ada0.png differ diff --git a/static/graphs/eee75995-321f-477f-8b57-eee4eedf4ba3 b/static/graphs/eee75995-321f-477f-8b57-eee4eedf4ba3 new file mode 100644 index 0000000..b5aa58f --- /dev/null +++ b/static/graphs/eee75995-321f-477f-8b57-eee4eedf4ba3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Booyah" [label="ransomware\nBooyah",shape=box,style=filled,color=deepskyblue];"ransomware=Booyah" -> "ransomware=MM Locker" [label="similar",dir="both"];"ransomware=MM Locker" [label="ransomware\nMM Locker",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/eee75995-321f-477f-8b57-eee4eedf4ba3.png b/static/graphs/eee75995-321f-477f-8b57-eee4eedf4ba3.png new file mode 100644 index 0000000..ff5e586 Binary files /dev/null and b/static/graphs/eee75995-321f-477f-8b57-eee4eedf4ba3.png differ diff --git a/static/graphs/ef273807-c465-4728-9cee-5823422f42ee b/static/graphs/ef273807-c465-4728-9cee-5823422f42ee new file mode 100644 index 0000000..1ae68ab --- /dev/null +++ b/static/graphs/ef273807-c465-4728-9cee-5823422f42ee @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=SIP and Trust Provider Hijacking Mitigation - T1198" [label="mitre-enterprise-attack-course-of-action\nSIP and Trust Provider Hijacking Mitigation - T1198",shape=ellipse];"mitre-enterprise-attack-course-of-action=SIP and Trust Provider Hijacking Mitigation - T1198" -> "mitre-enterprise-attack-attack-pattern=SIP and Trust Provider Hijacking - T1198" [label="mitigates",];} diff --git a/static/graphs/ef273807-c465-4728-9cee-5823422f42ee.png b/static/graphs/ef273807-c465-4728-9cee-5823422f42ee.png new file mode 100644 index 0000000..147d5b3 Binary files /dev/null and b/static/graphs/ef273807-c465-4728-9cee-5823422f42ee.png differ diff --git a/static/graphs/ef2f721b-0bc0-4f2a-8803-263368fa467d b/static/graphs/ef2f721b-0bc0-4f2a-8803-263368fa467d new file mode 100644 index 0000000..b8f76f7 --- /dev/null +++ b/static/graphs/ef2f721b-0bc0-4f2a-8803-263368fa467d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Shark" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Noob" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ef2f721b-0bc0-4f2a-8803-263368fa467d.png b/static/graphs/ef2f721b-0bc0-4f2a-8803-263368fa467d.png new file mode 100644 index 0000000..098f019 Binary files /dev/null and b/static/graphs/ef2f721b-0bc0-4f2a-8803-263368fa467d.png differ diff --git a/static/graphs/efed95ba-d7e8-47ff-8c53-99c42426ee7c b/static/graphs/efed95ba-d7e8-47ff-8c53-99c42426ee7c new file mode 100644 index 0000000..a7aa50a --- /dev/null +++ b/static/graphs/efed95ba-d7e8-47ff-8c53-99c42426ee7c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" [label="mitre-enterprise-attack-intrusion-set\nPROMETHIUM - G0056",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" -> "microsoft-activity-group=PROMETHIUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" -> "threat-actor=PROMETHIUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=PROMETHIUM - G0056" -> "mitre-enterprise-attack-malware=Truvasys - S0178" [label="uses",];"microsoft-activity-group=PROMETHIUM" [label="microsoft-activity-group\nPROMETHIUM",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=Truvasys - S0178" [label="mitre-enterprise-attack-malware\nTruvasys - S0178",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Truvasys - S0178" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];"threat-actor=PROMETHIUM" [label="threat-actor\nPROMETHIUM",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/efed95ba-d7e8-47ff-8c53-99c42426ee7c.png b/static/graphs/efed95ba-d7e8-47ff-8c53-99c42426ee7c.png new file mode 100644 index 0000000..edbd196 Binary files /dev/null and b/static/graphs/efed95ba-d7e8-47ff-8c53-99c42426ee7c.png differ diff --git a/static/graphs/eff1a885-6f90-42a1-901f-eef6e7a1905e b/static/graphs/eff1a885-6f90-42a1-901f-eef6e7a1905e new file mode 100644 index 0000000..855c308 --- /dev/null +++ b/static/graphs/eff1a885-6f90-42a1-901f-eef6e7a1905e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Helminth - S0170" [label="mitre-enterprise-attack-malware\nHelminth - S0170",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Helminth - S0170" -> "malpedia=Helminth" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Helminth - S0170" -> "mitre-enterprise-attack-attack-pattern=Scheduled Task - T1053" [label="uses",];} diff --git a/static/graphs/eff1a885-6f90-42a1-901f-eef6e7a1905e.png b/static/graphs/eff1a885-6f90-42a1-901f-eef6e7a1905e.png new file mode 100644 index 0000000..645601d Binary files /dev/null and b/static/graphs/eff1a885-6f90-42a1-901f-eef6e7a1905e.png differ diff --git a/static/graphs/eff68b97-f36e-4827-ab1a-90523c16774c b/static/graphs/eff68b97-f36e-4827-ab1a-90523c16774c new file mode 100644 index 0000000..fc052a6 --- /dev/null +++ b/static/graphs/eff68b97-f36e-4827-ab1a-90523c16774c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Derusbi" [label="tool\nDerusbi",shape=box,style=filled,color=deepskyblue];"tool=Derusbi" -> "mitre-enterprise-attack-malware=Derusbi - S0021" [label="similar",dir="both"];"tool=Derusbi" -> "malpedia=Derusbi (Windows)" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Derusbi - S0021" [label="mitre-enterprise-attack-malware\nDerusbi - S0021",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Derusbi - S0021" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];} diff --git a/static/graphs/eff68b97-f36e-4827-ab1a-90523c16774c.png b/static/graphs/eff68b97-f36e-4827-ab1a-90523c16774c.png new file mode 100644 index 0000000..5b7d692 Binary files /dev/null and b/static/graphs/eff68b97-f36e-4827-ab1a-90523c16774c.png differ diff --git a/static/graphs/effb83a0-ead1-4b36-b7f6-b7bdf9c4616e b/static/graphs/effb83a0-ead1-4b36-b7f6-b7bdf9c4616e new file mode 100644 index 0000000..e50af7e --- /dev/null +++ b/static/graphs/effb83a0-ead1-4b36-b7f6-b7bdf9c4616e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Replication Through Removable Media Mitigation - T1091" [label="mitre-enterprise-attack-course-of-action\nReplication Through Removable Media Mitigation - T1091",shape=ellipse];"mitre-enterprise-attack-course-of-action=Replication Through Removable Media Mitigation - T1091" -> "mitre-enterprise-attack-attack-pattern=Replication Through Removable Media - T1091" [label="mitigates",];} diff --git a/static/graphs/effb83a0-ead1-4b36-b7f6-b7bdf9c4616e.png b/static/graphs/effb83a0-ead1-4b36-b7f6-b7bdf9c4616e.png new file mode 100644 index 0000000..fa62159 Binary files /dev/null and b/static/graphs/effb83a0-ead1-4b36-b7f6-b7bdf9c4616e.png differ diff --git a/static/graphs/f047ee18-7985-4946-8bfb-4ed754d3a0dd b/static/graphs/f047ee18-7985-4946-8bfb-4ed754d3a0dd new file mode 100644 index 0000000..d044277 --- /dev/null +++ b/static/graphs/f047ee18-7985-4946-8bfb-4ed754d3a0dd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=APT30 - G0013" [label="mitre-enterprise-attack-intrusion-set\nAPT30 - G0013",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" -> "mitre-enterprise-attack-intrusion-set=Naikon - G0019" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" -> "threat-actor=Naikon" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" -> "threat-actor=Lotus Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" -> "threat-actor=APT 30" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" -> "mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="uses",];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" [label="mitre-enterprise-attack-intrusion-set\nNaikon - G0019",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" -> "mitre-enterprise-attack-tool=netsh - S0108" [label="uses",];"mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="mitre-enterprise-attack-malware\nBACKSPACE - S0031",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "tool=Backspace" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Command and Control Channel - T1041" [label="uses",];"threat-actor=Naikon" [label="threat-actor\nNaikon",shape=octagon,style=filled,color=indianred1];"threat-actor=Lotus Panda" [label="threat-actor\nLotus Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=APT 30" [label="threat-actor\nAPT 30",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-tool=netsh - S0108" [label="mitre-enterprise-attack-tool\nnetsh - S0108",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=netsh - S0108" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="uses",];"tool=Backspace" [label="tool\nBackspace",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f047ee18-7985-4946-8bfb-4ed754d3a0dd.png b/static/graphs/f047ee18-7985-4946-8bfb-4ed754d3a0dd.png new file mode 100644 index 0000000..3818e08 Binary files /dev/null and b/static/graphs/f047ee18-7985-4946-8bfb-4ed754d3a0dd.png differ diff --git a/static/graphs/f091dfcb-07f4-4414-849e-c644e7327d94 b/static/graphs/f091dfcb-07f4-4414-849e-c644e7327d94 new file mode 100644 index 0000000..f2c1423 --- /dev/null +++ b/static/graphs/f091dfcb-07f4-4414-849e-c644e7327d94 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=OmniRAT" [label="rat\nOmniRAT",shape=box,style=filled,color=deepskyblue];"rat=OmniRAT" -> "malpedia=OmniRAT" [label="similar",dir="both"];} diff --git a/static/graphs/f091dfcb-07f4-4414-849e-c644e7327d94.png b/static/graphs/f091dfcb-07f4-4414-849e-c644e7327d94.png new file mode 100644 index 0000000..42f9a8f Binary files /dev/null and b/static/graphs/f091dfcb-07f4-4414-849e-c644e7327d94.png differ diff --git a/static/graphs/f0a42cad-9b1f-44da-a672-718f18381018 b/static/graphs/f0a42cad-9b1f-44da-a672-718f18381018 new file mode 100644 index 0000000..2dd3947 --- /dev/null +++ b/static/graphs/f0a42cad-9b1f-44da-a672-718f18381018 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Taint Shared Content Mitigation - T1080" [label="mitre-enterprise-attack-course-of-action\nTaint Shared Content Mitigation - T1080",shape=ellipse];"mitre-enterprise-attack-course-of-action=Taint Shared Content Mitigation - T1080" -> "mitre-enterprise-attack-attack-pattern=Taint Shared Content - T1080" [label="mitigates",];} diff --git a/static/graphs/f0a42cad-9b1f-44da-a672-718f18381018.png b/static/graphs/f0a42cad-9b1f-44da-a672-718f18381018.png new file mode 100644 index 0000000..7a5683a Binary files /dev/null and b/static/graphs/f0a42cad-9b1f-44da-a672-718f18381018.png differ diff --git a/static/graphs/f0ec2df5-2e38-4df3-970d-525352006f2e b/static/graphs/f0ec2df5-2e38-4df3-970d-525352006f2e new file mode 100644 index 0000000..d6ec785 --- /dev/null +++ b/static/graphs/f0ec2df5-2e38-4df3-970d-525352006f2e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Zeus" [label="banker\nZeus",shape=box,style=filled,color=deepskyblue];"banker=Zeus" -> "tool=Zeus" [label="similar",dir="both"];"banker=Zeus" -> "botnet=Zeus" [label="similar",dir="both"];"banker=Zeus" -> "malpedia=Zeus" [label="similar",dir="both"];"botnet=Zeus" [label="botnet\nZeus",shape=box,style=filled,color=deepskyblue];"tool=Zeus" [label="tool\nZeus",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f0ec2df5-2e38-4df3-970d-525352006f2e.png b/static/graphs/f0ec2df5-2e38-4df3-970d-525352006f2e.png new file mode 100644 index 0000000..e1de521 Binary files /dev/null and b/static/graphs/f0ec2df5-2e38-4df3-970d-525352006f2e.png differ diff --git a/static/graphs/f0fcbac5-6216-4c3c-adcb-3aa06ab23340 b/static/graphs/f0fcbac5-6216-4c3c-adcb-3aa06ab23340 new file mode 100644 index 0000000..f7547e7 --- /dev/null +++ b/static/graphs/f0fcbac5-6216-4c3c-adcb-3aa06ab23340 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Ransoc" [label="ransomware\nRansoc",shape=box,style=filled,color=deepskyblue];"ransomware=Ransoc" -> "malpedia=Ransoc" [label="similar",dir="both"];} diff --git a/static/graphs/f0fcbac5-6216-4c3c-adcb-3aa06ab23340.png b/static/graphs/f0fcbac5-6216-4c3c-adcb-3aa06ab23340.png new file mode 100644 index 0000000..a46396d Binary files /dev/null and b/static/graphs/f0fcbac5-6216-4c3c-adcb-3aa06ab23340.png differ diff --git a/static/graphs/f1041289-f42b-416f-b649-7bb8e543011f b/static/graphs/f1041289-f42b-416f-b649-7bb8e543011f new file mode 100644 index 0000000..ce069b1 --- /dev/null +++ b/static/graphs/f1041289-f42b-416f-b649-7bb8e543011f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=MegaCortex" [label="ransomware\nMegaCortex",shape=box,style=filled,color=deepskyblue];"ransomware=MegaCortex" -> "ransomware=LockerGoga" [label="similar",dir="both"];"ransomware=LockerGoga" [label="ransomware\nLockerGoga",shape=box,style=filled,color=deepskyblue];"ransomware=LockerGoga" -> "ransomware=Nodera Ransomware" [label="similar",dir="both"];} diff --git a/static/graphs/f1041289-f42b-416f-b649-7bb8e543011f.png b/static/graphs/f1041289-f42b-416f-b649-7bb8e543011f.png new file mode 100644 index 0000000..507a282 Binary files /dev/null and b/static/graphs/f1041289-f42b-416f-b649-7bb8e543011f.png differ diff --git a/static/graphs/f108215f-3487-489d-be8b-80e346d32518 b/static/graphs/f108215f-3487-489d-be8b-80e346d32518 new file mode 100644 index 0000000..3463106 --- /dev/null +++ b/static/graphs/f108215f-3487-489d-be8b-80e346d32518 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Komplex - S0162" [label="mitre-enterprise-attack-malware\nKomplex - S0162",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Komplex - S0162" -> "malpedia=Komplex" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Komplex - S0162" -> "tool=GAMEFISH" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Komplex - S0162" -> "tool=SOURFACE" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Komplex - S0162" -> "tool=CORESHELL" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Komplex - S0162" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=GAMEFISH" [label="tool\nGAMEFISH",shape=box,style=filled,color=deepskyblue];"tool=GAMEFISH" -> "mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="similar",dir="both"];"tool=GAMEFISH" -> "android=Sofacy" [label="similar",dir="both"];"tool=GAMEFISH" -> "malpedia=Seduploader" [label="similar",dir="both"];"tool=SOURFACE" [label="tool\nSOURFACE",shape=box,style=filled,color=deepskyblue];"tool=SOURFACE" -> "mitre-enterprise-attack-malware=CORESHELL - S0137" [label="similar",dir="both"];"tool=CORESHELL" [label="tool\nCORESHELL",shape=box,style=filled,color=deepskyblue];"android=Sofacy" [label="android\nSofacy",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CORESHELL - S0137" [label="mitre-enterprise-attack-malware\nCORESHELL - S0137",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=CORESHELL - S0137" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" [label="mitre-enterprise-attack-malware\nJHUHUGIT - S0044",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=JHUHUGIT - S0044" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Privilege Escalation - T1068" [label="uses",];} diff --git a/static/graphs/f108215f-3487-489d-be8b-80e346d32518.png b/static/graphs/f108215f-3487-489d-be8b-80e346d32518.png new file mode 100644 index 0000000..2221550 Binary files /dev/null and b/static/graphs/f108215f-3487-489d-be8b-80e346d32518.png differ diff --git a/static/graphs/f1b691cb-2824-4e3a-9d5b-76aea4a087db b/static/graphs/f1b691cb-2824-4e3a-9d5b-76aea4a087db new file mode 100644 index 0000000..b0a164e --- /dev/null +++ b/static/graphs/f1b691cb-2824-4e3a-9d5b-76aea4a087db @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rsit=Intrusions:Unprivileged Account Compromise" [label="rsit\nIntrusions:Unprivileged Account Compromise",shape=ellipse];"rsit=Intrusions:Unprivileged Account Compromise" -> "mitre-enterprise-attack-attack-pattern=Valid Accounts - T1078" [label="similar",dir="both"];} diff --git a/static/graphs/f1b691cb-2824-4e3a-9d5b-76aea4a087db.png b/static/graphs/f1b691cb-2824-4e3a-9d5b-76aea4a087db.png new file mode 100644 index 0000000..b21905d Binary files /dev/null and b/static/graphs/f1b691cb-2824-4e3a-9d5b-76aea4a087db.png differ diff --git a/static/graphs/f1e05a12-ca50-41ab-a963-d7df5bcb141d b/static/graphs/f1e05a12-ca50-41ab-a963-d7df5bcb141d new file mode 100644 index 0000000..2e156cb --- /dev/null +++ b/static/graphs/f1e05a12-ca50-41ab-a963-d7df5bcb141d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=BISCUIT" [label="tool\nBISCUIT",shape=box,style=filled,color=deepskyblue];"tool=BISCUIT" -> "mitre-enterprise-attack-malware=BISCUIT - S0017" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BISCUIT - S0017" [label="mitre-enterprise-attack-malware\nBISCUIT - S0017",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BISCUIT - S0017" -> "mitre-enterprise-attack-attack-pattern=Fallback Channels - T1008" [label="uses",];} diff --git a/static/graphs/f1e05a12-ca50-41ab-a963-d7df5bcb141d.png b/static/graphs/f1e05a12-ca50-41ab-a963-d7df5bcb141d.png new file mode 100644 index 0000000..6e5f815 Binary files /dev/null and b/static/graphs/f1e05a12-ca50-41ab-a963-d7df5bcb141d.png differ diff --git a/static/graphs/f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc b/static/graphs/f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc new file mode 100644 index 0000000..4f7839f --- /dev/null +++ b/static/graphs/f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Owari" [label="botnet\nOwari",shape=box,style=filled,color=deepskyblue];"botnet=Owari" -> "malpedia=Owari" [label="similar",dir="both"];"botnet=Owari" -> "botnet=Mirai" [label="variant-of",];"botnet=Owari" -> "tool=Mirai" [label="variant-of",];"botnet=Owari" -> "botnet=Sora" [label="variant-of",];"botnet=Mirai" [label="botnet\nMirai",shape=box,style=filled,color=deepskyblue];"botnet=Mirai" -> "malpedia=Mirai (ELF)" [label="similar",dir="both"];"botnet=Mirai" -> "botnet=Owari" [label="variant-of",];"botnet=Mirai" -> "botnet=Sora" [label="variant-of",];"botnet=Sora" [label="botnet\nSora",shape=box,style=filled,color=deepskyblue];"botnet=Sora" -> "botnet=Mirai" [label="variant-of",];"botnet=Sora" -> "tool=Mirai" [label="variant-of",];"botnet=Sora" -> "botnet=Owari" [label="variant-of",];"tool=Mirai" [label="tool\nMirai",shape=box,style=filled,color=deepskyblue];"tool=Mirai" -> "botnet=Owari" [label="variant-of",];"tool=Mirai" -> "botnet=Sora" [label="variant-of",];} diff --git a/static/graphs/f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc.png b/static/graphs/f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc.png new file mode 100644 index 0000000..187882a Binary files /dev/null and b/static/graphs/f24ad5ca-04c5-4cd0-bd72-209ebce4fdbc.png differ diff --git a/static/graphs/f258f96c-8281-4b24-8aa7-4e23d1a5540e b/static/graphs/f258f96c-8281-4b24-8aa7-4e23d1a5540e new file mode 100644 index 0000000..e206e96 --- /dev/null +++ b/static/graphs/f258f96c-8281-4b24-8aa7-4e23d1a5540e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=SSHDoor" [label="tool\nSSHDoor",shape=box,style=filled,color=deepskyblue];"tool=SSHDoor" -> "malpedia=SSHDoor" [label="similar",dir="both"];} diff --git a/static/graphs/f258f96c-8281-4b24-8aa7-4e23d1a5540e.png b/static/graphs/f258f96c-8281-4b24-8aa7-4e23d1a5540e.png new file mode 100644 index 0000000..4b1f496 Binary files /dev/null and b/static/graphs/f258f96c-8281-4b24-8aa7-4e23d1a5540e.png differ diff --git a/static/graphs/f26144c5-8593-4e78-831a-11f6452d809b b/static/graphs/f26144c5-8593-4e78-831a-11f6452d809b new file mode 100644 index 0000000..0282e97 --- /dev/null +++ b/static/graphs/f26144c5-8593-4e78-831a-11f6452d809b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=APT 30" [label="threat-actor\nAPT 30",shape=octagon,style=filled,color=indianred1];"threat-actor=APT 30" -> "mitre-enterprise-attack-intrusion-set=Naikon - G0019" [label="similar",dir="both"];"threat-actor=APT 30" -> "threat-actor=Naikon" [label="similar",dir="both"];"threat-actor=APT 30" -> "threat-actor=Lotus Panda" [label="similar",dir="both"];"threat-actor=APT 30" -> "mitre-enterprise-attack-intrusion-set=APT30 - G0013" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" [label="mitre-enterprise-attack-intrusion-set\nNaikon - G0019",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Naikon - G0019" -> "mitre-enterprise-attack-tool=netsh - S0108" [label="uses",];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" [label="mitre-enterprise-attack-intrusion-set\nAPT30 - G0013",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT30 - G0013" -> "mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="uses",];"threat-actor=Naikon" [label="threat-actor\nNaikon",shape=octagon,style=filled,color=indianred1];"threat-actor=Lotus Panda" [label="threat-actor\nLotus Panda",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="mitre-enterprise-attack-malware\nBACKSPACE - S0031",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "tool=Backspace" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Command and Control Channel - T1041" [label="uses",];"mitre-enterprise-attack-tool=netsh - S0108" [label="mitre-enterprise-attack-tool\nnetsh - S0108",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=netsh - S0108" -> "mitre-enterprise-attack-attack-pattern=Security Software Discovery - T1063" [label="uses",];"tool=Backspace" [label="tool\nBackspace",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f26144c5-8593-4e78-831a-11f6452d809b.png b/static/graphs/f26144c5-8593-4e78-831a-11f6452d809b.png new file mode 100644 index 0000000..e456a06 Binary files /dev/null and b/static/graphs/f26144c5-8593-4e78-831a-11f6452d809b.png differ diff --git a/static/graphs/f266754c-d0aa-4918-95a3-73b28eaa66e3 b/static/graphs/f266754c-d0aa-4918-95a3-73b28eaa66e3 new file mode 100644 index 0000000..b8808ea --- /dev/null +++ b/static/graphs/f266754c-d0aa-4918-95a3-73b28eaa66e3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=MoonWind" [label="rat\nMoonWind",shape=box,style=filled,color=deepskyblue];"rat=MoonWind" -> "mitre-enterprise-attack-malware=MoonWind - S0149" [label="similar",dir="both"];"rat=MoonWind" -> "tool=MoonWind" [label="similar",dir="both"];"rat=MoonWind" -> "malpedia=MoonWind" [label="similar",dir="both"];"mitre-enterprise-attack-malware=MoonWind - S0149" [label="mitre-enterprise-attack-malware\nMoonWind - S0149",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=MoonWind - S0149" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];"tool=MoonWind" [label="tool\nMoonWind",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f266754c-d0aa-4918-95a3-73b28eaa66e3.png b/static/graphs/f266754c-d0aa-4918-95a3-73b28eaa66e3.png new file mode 100644 index 0000000..b8d50e1 Binary files /dev/null and b/static/graphs/f266754c-d0aa-4918-95a3-73b28eaa66e3.png differ diff --git a/static/graphs/f27ef4f2-71fe-48b6-b7f4-02dcac14320e b/static/graphs/f27ef4f2-71fe-48b6-b7f4-02dcac14320e new file mode 100644 index 0000000..61d3891 --- /dev/null +++ b/static/graphs/f27ef4f2-71fe-48b6-b7f4-02dcac14320e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Private Keys Mitigation - T1145" [label="mitre-enterprise-attack-course-of-action\nPrivate Keys Mitigation - T1145",shape=ellipse];"mitre-enterprise-attack-course-of-action=Private Keys Mitigation - T1145" -> "mitre-enterprise-attack-attack-pattern=Private Keys - T1145" [label="mitigates",];} diff --git a/static/graphs/f27ef4f2-71fe-48b6-b7f4-02dcac14320e.png b/static/graphs/f27ef4f2-71fe-48b6-b7f4-02dcac14320e.png new file mode 100644 index 0000000..5ef1ef9 Binary files /dev/null and b/static/graphs/f27ef4f2-71fe-48b6-b7f4-02dcac14320e.png differ diff --git a/static/graphs/f28a20fd-d173-4603-807e-2cb3f51bdf04 b/static/graphs/f28a20fd-d173-4603-807e-2cb3f51bdf04 new file mode 100644 index 0000000..ae675fe --- /dev/null +++ b/static/graphs/f28a20fd-d173-4603-807e-2cb3f51bdf04 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Command-Line Interface Mitigation - T1059" [label="mitre-enterprise-attack-course-of-action\nCommand-Line Interface Mitigation - T1059",shape=ellipse];"mitre-enterprise-attack-course-of-action=Command-Line Interface Mitigation - T1059" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="mitigates",];} diff --git a/static/graphs/f28a20fd-d173-4603-807e-2cb3f51bdf04.png b/static/graphs/f28a20fd-d173-4603-807e-2cb3f51bdf04.png new file mode 100644 index 0000000..22be3d4 Binary files /dev/null and b/static/graphs/f28a20fd-d173-4603-807e-2cb3f51bdf04.png differ diff --git a/static/graphs/f296fc9c-2ff5-43ee-941e-6b49c438270a b/static/graphs/f296fc9c-2ff5-43ee-941e-6b49c438270a new file mode 100644 index 0000000..18d83c5 --- /dev/null +++ b/static/graphs/f296fc9c-2ff5-43ee-941e-6b49c438270a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Device Unlock Code Guessing or Brute Force - MOB-T1062" [label="mitre-mobile-attack-attack-pattern\nDevice Unlock Code Guessing or Brute Force - MOB-T1062",shape=ellipse];"mitre-mobile-attack-attack-pattern=Device Unlock Code Guessing or Brute Force - MOB-T1062" -> "mitre-mobile-attack-attack-pattern=Lockscreen Bypass - MOB-T1064" [label="revoked-by",];} diff --git a/static/graphs/f296fc9c-2ff5-43ee-941e-6b49c438270a.png b/static/graphs/f296fc9c-2ff5-43ee-941e-6b49c438270a.png new file mode 100644 index 0000000..5b614f7 Binary files /dev/null and b/static/graphs/f296fc9c-2ff5-43ee-941e-6b49c438270a.png differ diff --git a/static/graphs/f2cb6ce2-188d-4162-8feb-594f949b13dd b/static/graphs/f2cb6ce2-188d-4162-8feb-594f949b13dd new file mode 100644 index 0000000..0ce9cdb --- /dev/null +++ b/static/graphs/f2cb6ce2-188d-4162-8feb-594f949b13dd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Scheduled Task Mitigation - T1053" [label="mitre-enterprise-attack-course-of-action\nScheduled Task Mitigation - T1053",shape=ellipse];"mitre-enterprise-attack-course-of-action=Scheduled Task Mitigation - T1053" -> "mitre-enterprise-attack-attack-pattern=Scheduled Task - T1053" [label="mitigates",];} diff --git a/static/graphs/f2cb6ce2-188d-4162-8feb-594f949b13dd.png b/static/graphs/f2cb6ce2-188d-4162-8feb-594f949b13dd.png new file mode 100644 index 0000000..93ad554 Binary files /dev/null and b/static/graphs/f2cb6ce2-188d-4162-8feb-594f949b13dd.png differ diff --git a/static/graphs/f2dcee22-c275-405e-87fd-48630a19dfba b/static/graphs/f2dcee22-c275-405e-87fd-48630a19dfba new file mode 100644 index 0000000..ba538a3 --- /dev/null +++ b/static/graphs/f2dcee22-c275-405e-87fd-48630a19dfba @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Exploitation for Client Execution Mitigation - T1203" [label="mitre-enterprise-attack-course-of-action\nExploitation for Client Execution Mitigation - T1203",shape=ellipse];"mitre-enterprise-attack-course-of-action=Exploitation for Client Execution Mitigation - T1203" -> "mitre-enterprise-attack-attack-pattern=Exploitation for Client Execution - T1203" [label="mitigates",];} diff --git a/static/graphs/f2dcee22-c275-405e-87fd-48630a19dfba.png b/static/graphs/f2dcee22-c275-405e-87fd-48630a19dfba.png new file mode 100644 index 0000000..609b44a Binary files /dev/null and b/static/graphs/f2dcee22-c275-405e-87fd-48630a19dfba.png differ diff --git a/static/graphs/f2e8c7a1-cae1-45c4-baf0-6f21bdcbb2c2 b/static/graphs/f2e8c7a1-cae1-45c4-baf0-6f21bdcbb2c2 new file mode 100644 index 0000000..cd1eb17 --- /dev/null +++ b/static/graphs/f2e8c7a1-cae1-45c4-baf0-6f21bdcbb2c2 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=GLOOXMAIL - S0026" [label="mitre-enterprise-attack-malware\nGLOOXMAIL - S0026",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=GLOOXMAIL - S0026" -> "tool=GLOOXMAIL" [label="similar",dir="both"];"mitre-enterprise-attack-malware=GLOOXMAIL - S0026" -> "mitre-enterprise-attack-attack-pattern=Web Service - T1102" [label="uses",];"tool=GLOOXMAIL" [label="tool\nGLOOXMAIL",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f2e8c7a1-cae1-45c4-baf0-6f21bdcbb2c2.png b/static/graphs/f2e8c7a1-cae1-45c4-baf0-6f21bdcbb2c2.png new file mode 100644 index 0000000..a0ceca2 Binary files /dev/null and b/static/graphs/f2e8c7a1-cae1-45c4-baf0-6f21bdcbb2c2.png differ diff --git a/static/graphs/f3179cfb-9c86-4980-bd6b-e4fa74adaaa7 b/static/graphs/f3179cfb-9c86-4980-bd6b-e4fa74adaaa7 new file mode 100644 index 0000000..1418f58 --- /dev/null +++ b/static/graphs/f3179cfb-9c86-4980-bd6b-e4fa74adaaa7 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=ProjectSauron" [label="threat-actor\nProjectSauron",shape=octagon,style=filled,color=indianred1];"threat-actor=ProjectSauron" -> "mitre-enterprise-attack-intrusion-set=Strider - G0041" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Strider - G0041" [label="mitre-enterprise-attack-intrusion-set\nStrider - G0041",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Strider - G0041" -> "mitre-enterprise-attack-malware=Remsec - S0125" [label="uses",];"mitre-enterprise-attack-malware=Remsec - S0125" [label="mitre-enterprise-attack-malware\nRemsec - S0125",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Remsec - S0125" -> "malpedia=Remsec" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Remsec - S0125" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Alternative Protocol - T1048" [label="uses",];} diff --git a/static/graphs/f3179cfb-9c86-4980-bd6b-e4fa74adaaa7.png b/static/graphs/f3179cfb-9c86-4980-bd6b-e4fa74adaaa7.png new file mode 100644 index 0000000..0365e84 Binary files /dev/null and b/static/graphs/f3179cfb-9c86-4980-bd6b-e4fa74adaaa7.png differ diff --git a/static/graphs/f35f219a-6eed-11e8-980a-93bb96299951 b/static/graphs/f35f219a-6eed-11e8-980a-93bb96299951 new file mode 100644 index 0000000..b4a6fef --- /dev/null +++ b/static/graphs/f35f219a-6eed-11e8-980a-93bb96299951 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Roaming Mantis" [label="tool\nRoaming Mantis",shape=box,style=filled,color=deepskyblue];"tool=Roaming Mantis" -> "malpedia=Roaming Mantis" [label="similar",dir="both"];} diff --git a/static/graphs/f35f219a-6eed-11e8-980a-93bb96299951.png b/static/graphs/f35f219a-6eed-11e8-980a-93bb96299951.png new file mode 100644 index 0000000..7bc32e6 Binary files /dev/null and b/static/graphs/f35f219a-6eed-11e8-980a-93bb96299951.png differ diff --git a/static/graphs/f3813bbd-682c-400d-8165-778be6d3f91f b/static/graphs/f3813bbd-682c-400d-8165-778be6d3f91f new file mode 100644 index 0000000..1fa9de8 --- /dev/null +++ b/static/graphs/f3813bbd-682c-400d-8165-778be6d3f91f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Vawtrak" [label="banker\nVawtrak",shape=box,style=filled,color=deepskyblue];"banker=Vawtrak" -> "tool=Vawtrak" [label="similar",dir="both"];"banker=Vawtrak" -> "malpedia=Vawtrak" [label="similar",dir="both"];"tool=Vawtrak" [label="tool\nVawtrak",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f3813bbd-682c-400d-8165-778be6d3f91f.png b/static/graphs/f3813bbd-682c-400d-8165-778be6d3f91f.png new file mode 100644 index 0000000..3a5cb19 Binary files /dev/null and b/static/graphs/f3813bbd-682c-400d-8165-778be6d3f91f.png differ diff --git a/static/graphs/f3ac3d86-0fa2-4049-bfbc-1970004b8d32 b/static/graphs/f3ac3d86-0fa2-4049-bfbc-1970004b8d32 new file mode 100644 index 0000000..41e5116 --- /dev/null +++ b/static/graphs/f3ac3d86-0fa2-4049-bfbc-1970004b8d32 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Aumlib" [label="tool\nAumlib",shape=box,style=filled,color=deepskyblue];"tool=Aumlib" -> "malpedia=Graftor" [label="similar",dir="both"];} diff --git a/static/graphs/f3ac3d86-0fa2-4049-bfbc-1970004b8d32.png b/static/graphs/f3ac3d86-0fa2-4049-bfbc-1970004b8d32.png new file mode 100644 index 0000000..8e62648 Binary files /dev/null and b/static/graphs/f3ac3d86-0fa2-4049-bfbc-1970004b8d32.png differ diff --git a/static/graphs/f3bdec95-3d62-42d9-a840-29630f6cdc1a b/static/graphs/f3bdec95-3d62-42d9-a840-29630f6cdc1a new file mode 100644 index 0000000..fc26477 --- /dev/null +++ b/static/graphs/f3bdec95-3d62-42d9-a840-29630f6cdc1a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=DragonOK - G0017" [label="mitre-enterprise-attack-intrusion-set\nDragonOK - G0017",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=DragonOK - G0017" -> "mitre-enterprise-attack-intrusion-set=Moafee - G0002" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=DragonOK - G0017" -> "threat-actor=DragonOK" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=DragonOK - G0017" -> "mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="uses",];"mitre-enterprise-attack-intrusion-set=Moafee - G0002" [label="mitre-enterprise-attack-intrusion-set\nMoafee - G0002",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Moafee - G0002" -> "mitre-enterprise-attack-attack-pattern=Binary Padding - T1009" [label="uses",];"mitre-enterprise-attack-malware=PoisonIvy - S0012" [label="mitre-enterprise-attack-malware\nPoisonIvy - S0012",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "rat=PoisonIvy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "tool=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "tool=poisonivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "malpedia=Poison Ivy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PoisonIvy - S0012" -> "mitre-enterprise-attack-attack-pattern=Process Injection - T1055" [label="uses",];"threat-actor=DragonOK" [label="threat-actor\nDragonOK",shape=octagon,style=filled,color=indianred1];"rat=PoisonIvy" [label="rat\nPoisonIvy",shape=box,style=filled,color=deepskyblue];"rat=PoisonIvy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Poison Ivy" [label="tool\nPoison Ivy",shape=box,style=filled,color=deepskyblue];"tool=Poison Ivy" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=poisonivy" [label="tool\npoisonivy",shape=box,style=filled,color=deepskyblue];"threat-actor=Anchor Panda" [label="threat-actor\nAnchor Panda",shape=octagon,style=filled,color=indianred1];"threat-actor=Anchor Panda" -> "rat=Gh0st RAT" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Gh0st Rat" [label="uses",];"threat-actor=Anchor Panda" -> "rat=PoisonIvy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Poison Ivy" [label="uses",];"threat-actor=Anchor Panda" -> "tool=Torn RAT" [label="uses",];"rat=Gh0st RAT" [label="rat\nGh0st RAT",shape=box,style=filled,color=deepskyblue];"rat=Gh0st RAT" -> "malpedia=Ghost RAT" [label="similar",dir="both"];"rat=Gh0st RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Torn RAT" [label="tool\nTorn RAT",shape=box,style=filled,color=deepskyblue];"tool=Torn RAT" -> "threat-actor=Anchor Panda" [label="used-by",];"tool=Gh0st Rat" [label="tool\nGh0st Rat",shape=box,style=filled,color=deepskyblue];"tool=Gh0st Rat" -> "threat-actor=Anchor Panda" [label="used-by",];} diff --git a/static/graphs/f3bdec95-3d62-42d9-a840-29630f6cdc1a.png b/static/graphs/f3bdec95-3d62-42d9-a840-29630f6cdc1a.png new file mode 100644 index 0000000..f8e2ef5 Binary files /dev/null and b/static/graphs/f3bdec95-3d62-42d9-a840-29630f6cdc1a.png differ diff --git a/static/graphs/f3d0c735-330f-43c2-8e8e-51bcfa51e8c3 b/static/graphs/f3d0c735-330f-43c2-8e8e-51bcfa51e8c3 new file mode 100644 index 0000000..7bfe387 --- /dev/null +++ b/static/graphs/f3d0c735-330f-43c2-8e8e-51bcfa51e8c3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Custom Command and Control Protocol Mitigation - T1094" [label="mitre-enterprise-attack-course-of-action\nCustom Command and Control Protocol Mitigation - T1094",shape=ellipse];"mitre-enterprise-attack-course-of-action=Custom Command and Control Protocol Mitigation - T1094" -> "mitre-enterprise-attack-attack-pattern=Custom Command and Control Protocol - T1094" [label="mitigates",];} diff --git a/static/graphs/f3d0c735-330f-43c2-8e8e-51bcfa51e8c3.png b/static/graphs/f3d0c735-330f-43c2-8e8e-51bcfa51e8c3.png new file mode 100644 index 0000000..7f6656a Binary files /dev/null and b/static/graphs/f3d0c735-330f-43c2-8e8e-51bcfa51e8c3.png differ diff --git a/static/graphs/f4b159ea-97e5-483b-854b-c48a78d562aa b/static/graphs/f4b159ea-97e5-483b-854b-c48a78d562aa new file mode 100644 index 0000000..3e220cc --- /dev/null +++ b/static/graphs/f4b159ea-97e5-483b-854b-c48a78d562aa @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=PlugX" [label="tool\nPlugX",shape=box,style=filled,color=deepskyblue];"tool=PlugX" -> "rat=PlugX" [label="similar",dir="both"];"tool=PlugX" -> "mitre-enterprise-attack-malware=PlugX - S0013" [label="similar",dir="both"];"tool=PlugX" -> "malpedia=PlugX" [label="similar",dir="both"];"mitre-enterprise-attack-malware=PlugX - S0013" [label="mitre-enterprise-attack-malware\nPlugX - S0013",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PlugX - S0013" -> "mitre-enterprise-attack-attack-pattern=Query Registry - T1012" [label="uses",];"rat=PlugX" [label="rat\nPlugX",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f4b159ea-97e5-483b-854b-c48a78d562aa.png b/static/graphs/f4b159ea-97e5-483b-854b-c48a78d562aa.png new file mode 100644 index 0000000..224c796 Binary files /dev/null and b/static/graphs/f4b159ea-97e5-483b-854b-c48a78d562aa.png differ diff --git a/static/graphs/f4d8a2d6-c684-453a-8a14-cf4a94f755c5 b/static/graphs/f4d8a2d6-c684-453a-8a14-cf4a94f755c5 new file mode 100644 index 0000000..c54a013 --- /dev/null +++ b/static/graphs/f4d8a2d6-c684-453a-8a14-cf4a94f755c5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Vasport - S0207" [label="mitre-enterprise-attack-malware\nVasport - S0207",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Vasport - S0207" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];} diff --git a/static/graphs/f4d8a2d6-c684-453a-8a14-cf4a94f755c5.png b/static/graphs/f4d8a2d6-c684-453a-8a14-cf4a94f755c5.png new file mode 100644 index 0000000..901933c Binary files /dev/null and b/static/graphs/f4d8a2d6-c684-453a-8a14-cf4a94f755c5.png differ diff --git a/static/graphs/f512de42-f76b-40d2-9923-59e7dbdfec35 b/static/graphs/f512de42-f76b-40d2-9923-59e7dbdfec35 new file mode 100644 index 0000000..1cc35b1 --- /dev/null +++ b/static/graphs/f512de42-f76b-40d2-9923-59e7dbdfec35 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Sandworm" [label="threat-actor\nSandworm",shape=octagon,style=filled,color=indianred1];"threat-actor=Sandworm" -> "mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" [label="similar",dir="both"];"threat-actor=Sandworm" -> "threat-actor=TeleBots" [label="similar",dir="both"];"threat-actor=Sandworm" -> "threat-actor=ELECTRUM" [label="similar",dir="both"];"threat-actor=Sandworm" -> "threat-actor=GreyEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" [label="mitre-enterprise-attack-intrusion-set\nSandworm Team - G0034",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" -> "mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="uses",];"threat-actor=TeleBots" [label="threat-actor\nTeleBots",shape=octagon,style=filled,color=indianred1];"threat-actor=ELECTRUM" [label="threat-actor\nELECTRUM",shape=octagon,style=filled,color=indianred1];"threat-actor=GreyEnergy" [label="threat-actor\nGreyEnergy",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="mitre-enterprise-attack-malware\nBlackEnergy - S0089",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "tool=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "malpedia=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];"tool=BlackEnergy" [label="tool\nBlackEnergy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f512de42-f76b-40d2-9923-59e7dbdfec35.png b/static/graphs/f512de42-f76b-40d2-9923-59e7dbdfec35.png new file mode 100644 index 0000000..cb211ef Binary files /dev/null and b/static/graphs/f512de42-f76b-40d2-9923-59e7dbdfec35.png differ diff --git a/static/graphs/f5352566-1a64-49ac-8f7f-97e1d1a03300 b/static/graphs/f5352566-1a64-49ac-8f7f-97e1d1a03300 new file mode 100644 index 0000000..d34cad6 --- /dev/null +++ b/static/graphs/f5352566-1a64-49ac-8f7f-97e1d1a03300 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=AutoIt backdoor - S0129" [label="mitre-enterprise-attack-malware\nAutoIt backdoor - S0129",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=AutoIt backdoor - S0129" -> "mitre-enterprise-attack-attack-pattern=Bypass User Account Control - T1088" [label="uses",];} diff --git a/static/graphs/f5352566-1a64-49ac-8f7f-97e1d1a03300.png b/static/graphs/f5352566-1a64-49ac-8f7f-97e1d1a03300.png new file mode 100644 index 0000000..5a06e5c Binary files /dev/null and b/static/graphs/f5352566-1a64-49ac-8f7f-97e1d1a03300.png differ diff --git a/static/graphs/f5cacc72-f02a-42d1-a020-7a59650086bb b/static/graphs/f5cacc72-f02a-42d1-a020-7a59650086bb new file mode 100644 index 0000000..165d74b --- /dev/null +++ b/static/graphs/f5cacc72-f02a-42d1-a020-7a59650086bb @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=HummingBad" [label="android\nHummingBad",shape=box,style=filled,color=deepskyblue];"android=HummingBad" -> "mitre-mobile-attack-malware=HummingBad - MOB-S0038" [label="similar",dir="both"];"mitre-mobile-attack-malware=HummingBad - MOB-S0038" [label="mitre-mobile-attack-malware\nHummingBad - MOB-S0038",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=HummingBad - MOB-S0038" -> "mitre-mobile-attack-attack-pattern=Generate Fraudulent Advertising Revenue - MOB-T1075" [label="uses",];"mitre-mobile-attack-malware=HummingBad - MOB-S0038" -> "mitre-mobile-attack-attack-pattern=Manipulate App Store Rankings or Ratings - MOB-T1055" [label="uses",];} diff --git a/static/graphs/f5cacc72-f02a-42d1-a020-7a59650086bb.png b/static/graphs/f5cacc72-f02a-42d1-a020-7a59650086bb.png new file mode 100644 index 0000000..809117f Binary files /dev/null and b/static/graphs/f5cacc72-f02a-42d1-a020-7a59650086bb.png differ diff --git a/static/graphs/f6469191-1814-4dbe-a081-2a6daf83a10b b/static/graphs/f6469191-1814-4dbe-a081-2a6daf83a10b new file mode 100644 index 0000000..fa2b1fa --- /dev/null +++ b/static/graphs/f6469191-1814-4dbe-a081-2a6daf83a10b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Process Discovery Mitigation - T1057" [label="mitre-enterprise-attack-course-of-action\nProcess Discovery Mitigation - T1057",shape=ellipse];"mitre-enterprise-attack-course-of-action=Process Discovery Mitigation - T1057" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="mitigates",];} diff --git a/static/graphs/f6469191-1814-4dbe-a081-2a6daf83a10b.png b/static/graphs/f6469191-1814-4dbe-a081-2a6daf83a10b.png new file mode 100644 index 0000000..58c927d Binary files /dev/null and b/static/graphs/f6469191-1814-4dbe-a081-2a6daf83a10b.png differ diff --git a/static/graphs/f647cca0-7416-47e9-8342-94b84dd436cc b/static/graphs/f647cca0-7416-47e9-8342-94b84dd436cc new file mode 100644 index 0000000..c2e16bc --- /dev/null +++ b/static/graphs/f647cca0-7416-47e9-8342-94b84dd436cc @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=Remcos" [label="rat\nRemcos",shape=box,style=filled,color=deepskyblue];"rat=Remcos" -> "malpedia=Remcos" [label="similar",dir="both"];} diff --git a/static/graphs/f647cca0-7416-47e9-8342-94b84dd436cc.png b/static/graphs/f647cca0-7416-47e9-8342-94b84dd436cc.png new file mode 100644 index 0000000..e4cbb89 Binary files /dev/null and b/static/graphs/f647cca0-7416-47e9-8342-94b84dd436cc.png differ diff --git a/static/graphs/f68555ff-6fbd-4f5a-bc23-34996f629c52 b/static/graphs/f68555ff-6fbd-4f5a-bc23-34996f629c52 new file mode 100644 index 0000000..f5e3f26 --- /dev/null +++ b/static/graphs/f68555ff-6fbd-4f5a-bc23-34996f629c52 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Banjori" [label="banker\nBanjori",shape=box,style=filled,color=deepskyblue];"banker=Banjori" -> "malpedia=Banjori" [label="similar",dir="both"];} diff --git a/static/graphs/f68555ff-6fbd-4f5a-bc23-34996f629c52.png b/static/graphs/f68555ff-6fbd-4f5a-bc23-34996f629c52.png new file mode 100644 index 0000000..b5eae91 Binary files /dev/null and b/static/graphs/f68555ff-6fbd-4f5a-bc23-34996f629c52.png differ diff --git a/static/graphs/f6ac21b6-2592-400c-8472-10d0e2f1bfaf b/static/graphs/f6ac21b6-2592-400c-8472-10d0e2f1bfaf new file mode 100644 index 0000000..b6a0957 --- /dev/null +++ b/static/graphs/f6ac21b6-2592-400c-8472-10d0e2f1bfaf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=Adups - MOB-S0025" [label="mitre-mobile-attack-malware\nAdups - MOB-S0025",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=Adups - MOB-S0025" -> "mitre-mobile-attack-attack-pattern=Location Tracking - MOB-T1033" [label="uses",];"mitre-mobile-attack-malware=Adups - MOB-S0025" -> "mitre-mobile-attack-attack-pattern=Capture SMS Messages - MOB-T1015" [label="uses",];} diff --git a/static/graphs/f6ac21b6-2592-400c-8472-10d0e2f1bfaf.png b/static/graphs/f6ac21b6-2592-400c-8472-10d0e2f1bfaf.png new file mode 100644 index 0000000..0e4f9a2 Binary files /dev/null and b/static/graphs/f6ac21b6-2592-400c-8472-10d0e2f1bfaf.png differ diff --git a/static/graphs/f6ae7a52-f3b6-4525-9daf-640c083f006e b/static/graphs/f6ae7a52-f3b6-4525-9daf-640c083f006e new file mode 100644 index 0000000..f98af3c --- /dev/null +++ b/static/graphs/f6ae7a52-f3b6-4525-9daf-640c083f006e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=PHOREAL - S0158" [label="mitre-enterprise-attack-malware\nPHOREAL - S0158",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=PHOREAL - S0158" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/f6ae7a52-f3b6-4525-9daf-640c083f006e.png b/static/graphs/f6ae7a52-f3b6-4525-9daf-640c083f006e.png new file mode 100644 index 0000000..864b5d1 Binary files /dev/null and b/static/graphs/f6ae7a52-f3b6-4525-9daf-640c083f006e.png differ diff --git a/static/graphs/f6b7c116-0821-4eb7-9b24-62bd09b3e575 b/static/graphs/f6b7c116-0821-4eb7-9b24-62bd09b3e575 new file mode 100644 index 0000000..0489007 --- /dev/null +++ b/static/graphs/f6b7c116-0821-4eb7-9b24-62bd09b3e575 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Port Knocking Mitigation - T1205" [label="mitre-enterprise-attack-course-of-action\nPort Knocking Mitigation - T1205",shape=ellipse];"mitre-enterprise-attack-course-of-action=Port Knocking Mitigation - T1205" -> "mitre-enterprise-attack-attack-pattern=Port Knocking - T1205" [label="mitigates",];} diff --git a/static/graphs/f6b7c116-0821-4eb7-9b24-62bd09b3e575.png b/static/graphs/f6b7c116-0821-4eb7-9b24-62bd09b3e575.png new file mode 100644 index 0000000..13248f7 Binary files /dev/null and b/static/graphs/f6b7c116-0821-4eb7-9b24-62bd09b3e575.png differ diff --git a/static/graphs/f6c137f0-979c-4ce2-a0e5-2a080a5a1746 b/static/graphs/f6c137f0-979c-4ce2-a0e5-2a080a5a1746 new file mode 100644 index 0000000..8fe688a --- /dev/null +++ b/static/graphs/f6c137f0-979c-4ce2-a0e5-2a080a5a1746 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Sakula" [label="tool\nSakula",shape=box,style=filled,color=deepskyblue];"tool=Sakula" -> "rat=Sakula" [label="similar",dir="both"];"tool=Sakula" -> "mitre-enterprise-attack-malware=Sakula - S0074" [label="similar",dir="both"];"tool=Sakula" -> "malpedia=Sakula RAT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Sakula - S0074" [label="mitre-enterprise-attack-malware\nSakula - S0074",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Sakula - S0074" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];"rat=Sakula" [label="rat\nSakula",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f6c137f0-979c-4ce2-a0e5-2a080a5a1746.png b/static/graphs/f6c137f0-979c-4ce2-a0e5-2a080a5a1746.png new file mode 100644 index 0000000..6824df0 Binary files /dev/null and b/static/graphs/f6c137f0-979c-4ce2-a0e5-2a080a5a1746.png differ diff --git a/static/graphs/f6d1d2cb-12f5-4221-9636-44606ea1f3f8 b/static/graphs/f6d1d2cb-12f5-4221-9636-44606ea1f3f8 new file mode 100644 index 0000000..fe4e35f --- /dev/null +++ b/static/graphs/f6d1d2cb-12f5-4221-9636-44606ea1f3f8 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=OSInfo - S0165" [label="mitre-enterprise-attack-malware\nOSInfo - S0165",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=OSInfo - S0165" -> "mitre-enterprise-attack-attack-pattern=Query Registry - T1012" [label="uses",];} diff --git a/static/graphs/f6d1d2cb-12f5-4221-9636-44606ea1f3f8.png b/static/graphs/f6d1d2cb-12f5-4221-9636-44606ea1f3f8.png new file mode 100644 index 0000000..28ff6a9 Binary files /dev/null and b/static/graphs/f6d1d2cb-12f5-4221-9636-44606ea1f3f8.png differ diff --git a/static/graphs/f762860a-5e7a-43bf-bef4-06bd27e0b023 b/static/graphs/f762860a-5e7a-43bf-bef4-06bd27e0b023 new file mode 100644 index 0000000..b8f3897 --- /dev/null +++ b/static/graphs/f762860a-5e7a-43bf-bef4-06bd27e0b023 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Red Alert" [label="ransomware\nRed Alert",shape=box,style=filled,color=deepskyblue];"ransomware=Red Alert" -> "malpedia=Red Alert" [label="similar",dir="both"];} diff --git a/static/graphs/f762860a-5e7a-43bf-bef4-06bd27e0b023.png b/static/graphs/f762860a-5e7a-43bf-bef4-06bd27e0b023.png new file mode 100644 index 0000000..90f9e5f Binary files /dev/null and b/static/graphs/f762860a-5e7a-43bf-bef4-06bd27e0b023.png differ diff --git a/static/graphs/f7c2e501-73b1-400f-a5d9-2e2e07b7dfde b/static/graphs/f7c2e501-73b1-400f-a5d9-2e2e07b7dfde new file mode 100644 index 0000000..c5353dc --- /dev/null +++ b/static/graphs/f7c2e501-73b1-400f-a5d9-2e2e07b7dfde @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Molerats" [label="threat-actor\nMolerats",shape=octagon,style=filled,color=indianred1];"threat-actor=Molerats" -> "mitre-enterprise-attack-intrusion-set=Molerats - G0021" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Molerats - G0021" [label="mitre-enterprise-attack-intrusion-set\nMolerats - G0021",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Molerats - G0021" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];} diff --git a/static/graphs/f7c2e501-73b1-400f-a5d9-2e2e07b7dfde.png b/static/graphs/f7c2e501-73b1-400f-a5d9-2e2e07b7dfde.png new file mode 100644 index 0000000..5ea455d Binary files /dev/null and b/static/graphs/f7c2e501-73b1-400f-a5d9-2e2e07b7dfde.png differ diff --git a/static/graphs/f7f53bb8-37ed-4bbe-9809-ca1594431536 b/static/graphs/f7f53bb8-37ed-4bbe-9809-ca1594431536 new file mode 100644 index 0000000..93db84a --- /dev/null +++ b/static/graphs/f7f53bb8-37ed-4bbe-9809-ca1594431536 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=KEYMARBLE" [label="tool\nKEYMARBLE",shape=box,style=filled,color=deepskyblue];"tool=KEYMARBLE" -> "malpedia=KEYMARBLE" [label="similar",dir="both"];} diff --git a/static/graphs/f7f53bb8-37ed-4bbe-9809-ca1594431536.png b/static/graphs/f7f53bb8-37ed-4bbe-9809-ca1594431536.png new file mode 100644 index 0000000..5650d98 Binary files /dev/null and b/static/graphs/f7f53bb8-37ed-4bbe-9809-ca1594431536.png differ diff --git a/static/graphs/f8047de2-fefc-4ee0-825b-f1fae4b20c09 b/static/graphs/f8047de2-fefc-4ee0-825b-f1fae4b20c09 new file mode 100644 index 0000000..6de2c48 --- /dev/null +++ b/static/graphs/f8047de2-fefc-4ee0-825b-f1fae4b20c09 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Slempo" [label="tool\nSlempo",shape=box,style=filled,color=deepskyblue];"tool=Slempo" -> "android=GM Bot" [label="similar",dir="both"];"tool=Slempo" -> "android=Bankosy" [label="similar",dir="both"];"tool=Slempo" -> "malpedia=Slempo" [label="similar",dir="both"];"android=GM Bot" [label="android\nGM Bot",shape=box,style=filled,color=deepskyblue];"android=Bankosy" [label="android\nBankosy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f8047de2-fefc-4ee0-825b-f1fae4b20c09.png b/static/graphs/f8047de2-fefc-4ee0-825b-f1fae4b20c09.png new file mode 100644 index 0000000..aa7d0ea Binary files /dev/null and b/static/graphs/f8047de2-fefc-4ee0-825b-f1fae4b20c09.png differ diff --git a/static/graphs/f855609e-b7ab-41e8-aafa-62016f8f4e1a b/static/graphs/f855609e-b7ab-41e8-aafa-62016f8f4e1a new file mode 100644 index 0000000..2ab2fe2 --- /dev/null +++ b/static/graphs/f855609e-b7ab-41e8-aafa-62016f8f4e1a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Encoder.xxxx" [label="ransomware\nEncoder.xxxx",shape=box,style=filled,color=deepskyblue];"ransomware=Encoder.xxxx" -> "ransomware=Windows_Security Ransonware" [label="similar",dir="both"];"ransomware=Windows_Security Ransonware" [label="ransomware\nWindows_Security Ransonware",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f855609e-b7ab-41e8-aafa-62016f8f4e1a.png b/static/graphs/f855609e-b7ab-41e8-aafa-62016f8f4e1a.png new file mode 100644 index 0000000..1175bc8 Binary files /dev/null and b/static/graphs/f855609e-b7ab-41e8-aafa-62016f8f4e1a.png differ diff --git a/static/graphs/f873db71-3d53-41d5-b141-530675ade27a b/static/graphs/f873db71-3d53-41d5-b141-530675ade27a new file mode 100644 index 0000000..b5ff90f --- /dev/null +++ b/static/graphs/f873db71-3d53-41d5-b141-530675ade27a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Rocket Kitten" -> "threat-actor=Flying Kitten" [label="similar",dir="both"];"threat-actor=Rocket Kitten" -> "mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="similar",dir="both"];"threat-actor=Rocket Kitten" -> "threat-actor=Charming Kitten" [label="similar",dir="both"];"threat-actor=Rocket Kitten" -> "threat-actor=Cleaver" [label="similar",dir="both"];"threat-actor=Rocket Kitten" -> "threat-actor=OilRig" [label="similar",dir="both"];"threat-actor=Rocket Kitten" -> "threat-actor=Clever Kitten" [label="similar",dir="both"];"threat-actor=Rocket Kitten" -> "threat-actor=CHRYSENE" [label="similar",dir="both"];"threat-actor=Rocket Kitten" -> "mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Cutting Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="similar",dir="both"];"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "threat-actor=Greenbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f873db71-3d53-41d5-b141-530675ade27a.png b/static/graphs/f873db71-3d53-41d5-b141-530675ade27a.png new file mode 100644 index 0000000..ab1626b Binary files /dev/null and b/static/graphs/f873db71-3d53-41d5-b141-530675ade27a.png differ diff --git a/static/graphs/f8cd62cb-b9d3-4352-8f46-0961cfde104c b/static/graphs/f8cd62cb-b9d3-4352-8f46-0961cfde104c new file mode 100644 index 0000000..0226ad4 --- /dev/null +++ b/static/graphs/f8cd62cb-b9d3-4352-8f46-0961cfde104c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Agent Tesla" [label="tool\nAgent Tesla",shape=box,style=filled,color=deepskyblue];"tool=Agent Tesla" -> "malpedia=Agent Tesla" [label="similar",dir="both"];} diff --git a/static/graphs/f8cd62cb-b9d3-4352-8f46-0961cfde104c.png b/static/graphs/f8cd62cb-b9d3-4352-8f46-0961cfde104c.png new file mode 100644 index 0000000..0295baf Binary files /dev/null and b/static/graphs/f8cd62cb-b9d3-4352-8f46-0961cfde104c.png differ diff --git a/static/graphs/f8dfbc54-b070-4224-b560-79aaa5f835bd b/static/graphs/f8dfbc54-b070-4224-b560-79aaa5f835bd new file mode 100644 index 0000000..6e27f83 --- /dev/null +++ b/static/graphs/f8dfbc54-b070-4224-b560-79aaa5f835bd @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=H1N1 - S0132" [label="mitre-enterprise-attack-malware\nH1N1 - S0132",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=H1N1 - S0132" -> "mitre-enterprise-attack-attack-pattern=Command-Line Interface - T1059" [label="uses",];} diff --git a/static/graphs/f8dfbc54-b070-4224-b560-79aaa5f835bd.png b/static/graphs/f8dfbc54-b070-4224-b560-79aaa5f835bd.png new file mode 100644 index 0000000..e898466 Binary files /dev/null and b/static/graphs/f8dfbc54-b070-4224-b560-79aaa5f835bd.png differ diff --git a/static/graphs/f93acc85-8d2c-41e0-b0c5-47795b8c6194 b/static/graphs/f93acc85-8d2c-41e0-b0c5-47795b8c6194 new file mode 100644 index 0000000..30d5e56 --- /dev/null +++ b/static/graphs/f93acc85-8d2c-41e0-b0c5-47795b8c6194 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Smominru" [label="banker\nSmominru",shape=box,style=filled,color=deepskyblue];"banker=Smominru" -> "malpedia=Smominru" [label="similar",dir="both"];} diff --git a/static/graphs/f93acc85-8d2c-41e0-b0c5-47795b8c6194.png b/static/graphs/f93acc85-8d2c-41e0-b0c5-47795b8c6194.png new file mode 100644 index 0000000..dda1a37 Binary files /dev/null and b/static/graphs/f93acc85-8d2c-41e0-b0c5-47795b8c6194.png differ diff --git a/static/graphs/f98bac6b-12fd-4cad-be84-c84666932232 b/static/graphs/f98bac6b-12fd-4cad-be84-c84666932232 new file mode 100644 index 0000000..0e273ec --- /dev/null +++ b/static/graphs/f98bac6b-12fd-4cad-be84-c84666932232 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "threat-actor=Flying Kitten" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "threat-actor=Rocket Kitten" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "threat-actor=Cleaver" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "threat-actor=OilRig" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "threat-actor=Clever Kitten" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "threat-actor=CHRYSENE" [label="similar",dir="both"];"threat-actor=Charming Kitten" -> "mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Cutting Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "threat-actor=Greenbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f98bac6b-12fd-4cad-be84-c84666932232.png b/static/graphs/f98bac6b-12fd-4cad-be84-c84666932232.png new file mode 100644 index 0000000..28dedab Binary files /dev/null and b/static/graphs/f98bac6b-12fd-4cad-be84-c84666932232.png differ diff --git a/static/graphs/f9b3e5d9-7454-4b7d-bce6-27620e19924e b/static/graphs/f9b3e5d9-7454-4b7d-bce6-27620e19924e new file mode 100644 index 0000000..50e1b43 --- /dev/null +++ b/static/graphs/f9b3e5d9-7454-4b7d-bce6-27620e19924e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Redundant Access Mitigation - T1108" [label="mitre-enterprise-attack-course-of-action\nRedundant Access Mitigation - T1108",shape=ellipse];"mitre-enterprise-attack-course-of-action=Redundant Access Mitigation - T1108" -> "mitre-enterprise-attack-attack-pattern=Redundant Access - T1108" [label="mitigates",];} diff --git a/static/graphs/f9b3e5d9-7454-4b7d-bce6-27620e19924e.png b/static/graphs/f9b3e5d9-7454-4b7d-bce6-27620e19924e.png new file mode 100644 index 0000000..34b5760 Binary files /dev/null and b/static/graphs/f9b3e5d9-7454-4b7d-bce6-27620e19924e.png differ diff --git a/static/graphs/f9c06633-dcff-48a1-8588-759e7cec5694 b/static/graphs/f9c06633-dcff-48a1-8588-759e7cec5694 new file mode 100644 index 0000000..38c9439 --- /dev/null +++ b/static/graphs/f9c06633-dcff-48a1-8588-759e7cec5694 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=PLATINUM - G0068" [label="mitre-enterprise-attack-intrusion-set\nPLATINUM - G0068",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=PLATINUM - G0068" -> "microsoft-activity-group=PLATINUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=PLATINUM - G0068" -> "threat-actor=PLATINUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=PLATINUM - G0068" -> "mitre-enterprise-attack-attack-pattern=Input Capture - T1056" [label="uses",];"microsoft-activity-group=PLATINUM" [label="microsoft-activity-group\nPLATINUM",shape=octagon,style=filled,color=indianred1];"threat-actor=PLATINUM" [label="threat-actor\nPLATINUM",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/f9c06633-dcff-48a1-8588-759e7cec5694.png b/static/graphs/f9c06633-dcff-48a1-8588-759e7cec5694.png new file mode 100644 index 0000000..da4ec69 Binary files /dev/null and b/static/graphs/f9c06633-dcff-48a1-8588-759e7cec5694.png differ diff --git a/static/graphs/f9d6633a-55e6-4adc-9263-6ae080421a13 b/static/graphs/f9d6633a-55e6-4adc-9263-6ae080421a13 new file mode 100644 index 0000000..bba7332 --- /dev/null +++ b/static/graphs/f9d6633a-55e6-4adc-9263-6ae080421a13 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" [label="mitre-enterprise-attack-intrusion-set\nMagic Hound - G0059",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "threat-actor=Flying Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "threat-actor=Charming Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "threat-actor=Rocket Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "threat-actor=Cleaver" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "threat-actor=OilRig" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "threat-actor=Clever Kitten" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "threat-actor=CHRYSENE" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Magic Hound - G0059" -> "mitre-enterprise-attack-attack-pattern=System Owner/User Discovery - T1033" [label="uses",];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" [label="mitre-enterprise-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Cleaver - G0003" -> "threat-actor=Cutting Kitten" [label="similar",dir="both"];"mitre-pre-attack-intrusion-set=Cleaver - G0003" [label="mitre-pre-attack-intrusion-set\nCleaver - G0003",shape=octagon,style=filled,color=indianred1];"mitre-pre-attack-intrusion-set=Cleaver - G0003" -> "mitre-enterprise-attack-malware=TinyZBot - S0004" [label="uses",];"threat-actor=Flying Kitten" [label="threat-actor\nFlying Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" [label="threat-actor\nCharming Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Charming Kitten" -> "mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="similar",dir="both"];"threat-actor=Rocket Kitten" [label="threat-actor\nRocket Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Cleaver" [label="threat-actor\nCleaver",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" [label="threat-actor\nOilRig",shape=octagon,style=filled,color=indianred1];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="similar",dir="both"];"threat-actor=OilRig" -> "mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="similar",dir="both"];"threat-actor=Clever Kitten" [label="threat-actor\nClever Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" [label="threat-actor\nCHRYSENE",shape=octagon,style=filled,color=indianred1];"threat-actor=CHRYSENE" -> "threat-actor=Greenbug" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" [label="mitre-enterprise-attack-intrusion-set\nAPT34 - G0057",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT34 - G0057" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" [label="mitre-enterprise-attack-intrusion-set\nOilRig - G0049",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=OilRig - G0049" -> "mitre-enterprise-attack-attack-pattern=Obfuscated Files or Information - T1027" [label="uses",];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" [label="mitre-enterprise-attack-intrusion-set\nCharming Kitten - G0058",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Charming Kitten - G0058" -> "mitre-enterprise-attack-malware=DownPaper - S0186" [label="uses",];"mitre-enterprise-attack-malware=TinyZBot - S0004" [label="mitre-enterprise-attack-malware\nTinyZBot - S0004",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "tool=TinyZBot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=TinyZBot - S0004" -> "mitre-enterprise-attack-attack-pattern=Disabling Security Tools - T1089" [label="uses",];"threat-actor=Cutting Kitten" [label="threat-actor\nCutting Kitten",shape=octagon,style=filled,color=indianred1];"threat-actor=Greenbug" [label="threat-actor\nGreenbug",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=DownPaper - S0186" [label="mitre-enterprise-attack-malware\nDownPaper - S0186",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "malpedia=DownPaper" [label="similar",dir="both"];"mitre-enterprise-attack-malware=DownPaper - S0186" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=TinyZBot" [label="tool\nTinyZBot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/f9d6633a-55e6-4adc-9263-6ae080421a13.png b/static/graphs/f9d6633a-55e6-4adc-9263-6ae080421a13.png new file mode 100644 index 0000000..d461ed0 Binary files /dev/null and b/static/graphs/f9d6633a-55e6-4adc-9263-6ae080421a13.png differ diff --git a/static/graphs/f9e0b922-253c-40fa-a6d2-e60ec9c6980b b/static/graphs/f9e0b922-253c-40fa-a6d2-e60ec9c6980b new file mode 100644 index 0000000..4c6f9f5 --- /dev/null +++ b/static/graphs/f9e0b922-253c-40fa-a6d2-e60ec9c6980b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Koadic" [label="tool\nKoadic",shape=box,style=filled,color=deepskyblue];"tool=Koadic" -> "malpedia=Koadic" [label="similar",dir="both"];} diff --git a/static/graphs/f9e0b922-253c-40fa-a6d2-e60ec9c6980b.png b/static/graphs/f9e0b922-253c-40fa-a6d2-e60ec9c6980b.png new file mode 100644 index 0000000..bb2b895 Binary files /dev/null and b/static/graphs/f9e0b922-253c-40fa-a6d2-e60ec9c6980b.png differ diff --git a/static/graphs/f9e4f526-ac9d-4df5-8949-833a82a1d2df b/static/graphs/f9e4f526-ac9d-4df5-8949-833a82a1d2df new file mode 100644 index 0000000..9317770 --- /dev/null +++ b/static/graphs/f9e4f526-ac9d-4df5-8949-833a82a1d2df @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-attack-pattern=Malicious or Vulnerable Built-in Device Functionality - MOB-T1076" [label="mitre-mobile-attack-attack-pattern\nMalicious or Vulnerable Built-in Device Functionality - MOB-T1076",shape=ellipse];} diff --git a/static/graphs/f9e4f526-ac9d-4df5-8949-833a82a1d2df.png b/static/graphs/f9e4f526-ac9d-4df5-8949-833a82a1d2df.png new file mode 100644 index 0000000..9c9ace9 Binary files /dev/null and b/static/graphs/f9e4f526-ac9d-4df5-8949-833a82a1d2df.png differ diff --git a/static/graphs/fa80877c-f509-4daf-8b62-20aba1635f68 b/static/graphs/fa80877c-f509-4daf-8b62-20aba1635f68 new file mode 100644 index 0000000..f04e290 --- /dev/null +++ b/static/graphs/fa80877c-f509-4daf-8b62-20aba1635f68 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=Turla Group" [label="threat-actor\nTurla Group",shape=octagon,style=filled,color=indianred1];"threat-actor=Turla Group" -> "mitre-enterprise-attack-intrusion-set=Turla - G0010" [label="similar",dir="both"];"threat-actor=Turla Group" -> "threat-actor=APT 26" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Turla - G0010" [label="mitre-enterprise-attack-intrusion-set\nTurla - G0010",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Turla - G0010" -> "mitre-enterprise-attack-malware=Epic - S0091" [label="uses",];"threat-actor=APT 26" [label="threat-actor\nAPT 26",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=Epic - S0091" [label="mitre-enterprise-attack-malware\nEpic - S0091",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Epic - S0091" -> "tool=Wipbot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Epic - S0091" -> "malpedia=Wipbot" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Epic - S0091" -> "mitre-enterprise-attack-attack-pattern=Standard Application Layer Protocol - T1071" [label="uses",];"tool=Wipbot" [label="tool\nWipbot",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/fa80877c-f509-4daf-8b62-20aba1635f68.png b/static/graphs/fa80877c-f509-4daf-8b62-20aba1635f68.png new file mode 100644 index 0000000..735203b Binary files /dev/null and b/static/graphs/fa80877c-f509-4daf-8b62-20aba1635f68.png differ diff --git a/static/graphs/fae44eea-caa7-42b7-a2e2-0c815ba81b9a b/static/graphs/fae44eea-caa7-42b7-a2e2-0c815ba81b9a new file mode 100644 index 0000000..e2b21e7 --- /dev/null +++ b/static/graphs/fae44eea-caa7-42b7-a2e2-0c815ba81b9a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Hidden Window Mitigation - T1143" [label="mitre-enterprise-attack-course-of-action\nHidden Window Mitigation - T1143",shape=ellipse];"mitre-enterprise-attack-course-of-action=Hidden Window Mitigation - T1143" -> "mitre-enterprise-attack-attack-pattern=Hidden Window - T1143" [label="mitigates",];} diff --git a/static/graphs/fae44eea-caa7-42b7-a2e2-0c815ba81b9a.png b/static/graphs/fae44eea-caa7-42b7-a2e2-0c815ba81b9a.png new file mode 100644 index 0000000..f3075e3 Binary files /dev/null and b/static/graphs/fae44eea-caa7-42b7-a2e2-0c815ba81b9a.png differ diff --git a/static/graphs/fb261c56-b80e-43a9-8351-c84081e7213d b/static/graphs/fb261c56-b80e-43a9-8351-c84081e7213d new file mode 100644 index 0000000..5bd7221 --- /dev/null +++ b/static/graphs/fb261c56-b80e-43a9-8351-c84081e7213d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=BACKSPACE - S0031" [label="mitre-enterprise-attack-malware\nBACKSPACE - S0031",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "tool=Backspace" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BACKSPACE - S0031" -> "mitre-enterprise-attack-attack-pattern=Exfiltration Over Command and Control Channel - T1041" [label="uses",];"tool=Backspace" [label="tool\nBackspace",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/fb261c56-b80e-43a9-8351-c84081e7213d.png b/static/graphs/fb261c56-b80e-43a9-8351-c84081e7213d.png new file mode 100644 index 0000000..84e75b7 Binary files /dev/null and b/static/graphs/fb261c56-b80e-43a9-8351-c84081e7213d.png differ diff --git a/static/graphs/fb366179-766c-4a4a-afa1-52bff1fd601c b/static/graphs/fb366179-766c-4a4a-afa1-52bff1fd601c new file mode 100644 index 0000000..4d77184 --- /dev/null +++ b/static/graphs/fb366179-766c-4a4a-afa1-52bff1fd601c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=Threat Group-3390 - G0027" [label="mitre-enterprise-attack-intrusion-set\nThreat Group-3390 - G0027",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Threat Group-3390 - G0027" -> "threat-actor=EMISSARY PANDA" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Threat Group-3390 - G0027" -> "mitre-enterprise-attack-tool=ipconfig - S0100" [label="uses",];"mitre-enterprise-attack-tool=ipconfig - S0100" [label="mitre-enterprise-attack-tool\nipconfig - S0100",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=ipconfig - S0100" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];"threat-actor=EMISSARY PANDA" [label="threat-actor\nEMISSARY PANDA",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/fb366179-766c-4a4a-afa1-52bff1fd601c.png b/static/graphs/fb366179-766c-4a4a-afa1-52bff1fd601c.png new file mode 100644 index 0000000..2746a6b Binary files /dev/null and b/static/graphs/fb366179-766c-4a4a-afa1-52bff1fd601c.png differ diff --git a/static/graphs/fb575479-14ef-41e9-bfab-0b7cf10bec73 b/static/graphs/fb575479-14ef-41e9-bfab-0b7cf10bec73 new file mode 100644 index 0000000..cfea54b --- /dev/null +++ b/static/graphs/fb575479-14ef-41e9-bfab-0b7cf10bec73 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=ADVSTORESHELL - S0045" [label="mitre-enterprise-attack-malware\nADVSTORESHELL - S0045",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ADVSTORESHELL - S0045" -> "tool=EVILTOSS" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ADVSTORESHELL - S0045" -> "malpedia=Sedreco" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ADVSTORESHELL - S0045" -> "mitre-enterprise-attack-attack-pattern=Data Encrypted - T1022" [label="uses",];"tool=EVILTOSS" [label="tool\nEVILTOSS",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/fb575479-14ef-41e9-bfab-0b7cf10bec73.png b/static/graphs/fb575479-14ef-41e9-bfab-0b7cf10bec73.png new file mode 100644 index 0000000..3ed4460 Binary files /dev/null and b/static/graphs/fb575479-14ef-41e9-bfab-0b7cf10bec73.png differ diff --git a/static/graphs/fbb470da-1d44-4f29-bbb3-9efbe20f94a3 b/static/graphs/fbb470da-1d44-4f29-bbb3-9efbe20f94a3 new file mode 100644 index 0000000..af596ef --- /dev/null +++ b/static/graphs/fbb470da-1d44-4f29-bbb3-9efbe20f94a3 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Mivast - S0080" [label="mitre-enterprise-attack-malware\nMivast - S0080",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Mivast - S0080" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];} diff --git a/static/graphs/fbb470da-1d44-4f29-bbb3-9efbe20f94a3.png b/static/graphs/fbb470da-1d44-4f29-bbb3-9efbe20f94a3.png new file mode 100644 index 0000000..ae7d3de Binary files /dev/null and b/static/graphs/fbb470da-1d44-4f29-bbb3-9efbe20f94a3.png differ diff --git a/static/graphs/fbd29c89-18ba-4c2d-b792-51c0adee049f b/static/graphs/fbd29c89-18ba-4c2d-b792-51c0adee049f new file mode 100644 index 0000000..73972a8 --- /dev/null +++ b/static/graphs/fbd29c89-18ba-4c2d-b792-51c0adee049f @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=APT33 - G0064" [label="mitre-enterprise-attack-intrusion-set\nAPT33 - G0064",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=APT33 - G0064" -> "threat-actor=APT33" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT33 - G0064" -> "threat-actor=MAGNALLIUM" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=APT33 - G0064" -> "mitre-enterprise-attack-attack-pattern=Spearphishing Link - T1192" [label="uses",];"threat-actor=APT33" [label="threat-actor\nAPT33",shape=octagon,style=filled,color=indianred1];"threat-actor=MAGNALLIUM" [label="threat-actor\nMAGNALLIUM",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/fbd29c89-18ba-4c2d-b792-51c0adee049f.png b/static/graphs/fbd29c89-18ba-4c2d-b792-51c0adee049f.png new file mode 100644 index 0000000..4d9e1c6 Binary files /dev/null and b/static/graphs/fbd29c89-18ba-4c2d-b792-51c0adee049f.png differ diff --git a/static/graphs/fbd727ea-c0dc-42a9-8448-9e12962d1ab5 b/static/graphs/fbd727ea-c0dc-42a9-8448-9e12962d1ab5 new file mode 100644 index 0000000..f3c8e1b --- /dev/null +++ b/static/graphs/fbd727ea-c0dc-42a9-8448-9e12962d1ab5 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=Havij - S0224" [label="mitre-enterprise-attack-tool\nHavij - S0224",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Havij - S0224" -> "mitre-enterprise-attack-attack-pattern=Exploit Public-Facing Application - T1190" [label="uses",];} diff --git a/static/graphs/fbd727ea-c0dc-42a9-8448-9e12962d1ab5.png b/static/graphs/fbd727ea-c0dc-42a9-8448-9e12962d1ab5.png new file mode 100644 index 0000000..9d49499 Binary files /dev/null and b/static/graphs/fbd727ea-c0dc-42a9-8448-9e12962d1ab5.png differ diff --git a/static/graphs/fbda9705-677b-4c5b-9b0b-13b52eff587c b/static/graphs/fbda9705-677b-4c5b-9b0b-13b52eff587c new file mode 100644 index 0000000..8c4ae9b --- /dev/null +++ b/static/graphs/fbda9705-677b-4c5b-9b0b-13b52eff587c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"android=LokiBot" [label="android\nLokiBot",shape=box,style=filled,color=deepskyblue];"android=LokiBot" -> "malpedia=Loki Password Stealer (PWS)" [label="similar",dir="both"];"android=LokiBot" -> "malpedia=LokiBot" [label="similar",dir="both"];} diff --git a/static/graphs/fbda9705-677b-4c5b-9b0b-13b52eff587c.png b/static/graphs/fbda9705-677b-4c5b-9b0b-13b52eff587c.png new file mode 100644 index 0000000..31edcdf Binary files /dev/null and b/static/graphs/fbda9705-677b-4c5b-9b0b-13b52eff587c.png differ diff --git a/static/graphs/fbe9387f-34e6-4828-ac28-3080020c597b b/static/graphs/fbe9387f-34e6-4828-ac28-3080020c597b new file mode 100644 index 0000000..9195292 --- /dev/null +++ b/static/graphs/fbe9387f-34e6-4828-ac28-3080020c597b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=FIN10 - G0051" [label="mitre-enterprise-attack-intrusion-set\nFIN10 - G0051",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=FIN10 - G0051" -> "mitre-enterprise-attack-attack-pattern=PowerShell - T1086" [label="uses",];} diff --git a/static/graphs/fbe9387f-34e6-4828-ac28-3080020c597b.png b/static/graphs/fbe9387f-34e6-4828-ac28-3080020c597b.png new file mode 100644 index 0000000..6c27f70 Binary files /dev/null and b/static/graphs/fbe9387f-34e6-4828-ac28-3080020c597b.png differ diff --git a/static/graphs/fc5ee56f-3cd1-4120-9b33-48993987d98d b/static/graphs/fc5ee56f-3cd1-4120-9b33-48993987d98d new file mode 100644 index 0000000..a08adbf --- /dev/null +++ b/static/graphs/fc5ee56f-3cd1-4120-9b33-48993987d98d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=CryptoMix-Shark" [label="ransomware\nCryptoMix-Shark",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-0000" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Arena" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Azer" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Backup" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-CK" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Coban" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-DLL" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Empty" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Error" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Exte" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=Cryptomix-FILE" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-MOLE66" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Noob" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Ogonia" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Pirate" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Revenge" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=Cryptomix-SERVER" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-System" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Tastylock" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Test" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Wallet" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=Cryptomix-WORK" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-x1881" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-XZZX" [label="similar",dir="both"];"ransomware=CryptoMix-Shark" -> "ransomware=CryptoMix-Zayka" [label="similar",dir="both"];"ransomware=CryptoMix" [label="ransomware\nCryptoMix",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix" -> "malpedia=CryptoMix" [label="similar",dir="both"];"ransomware=CryptoMix-0000" [label="ransomware\nCryptoMix-0000",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Arena" [label="ransomware\nCryptoMix-Arena",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Azer" [label="ransomware\nCryptoMix-Azer",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Backup" [label="ransomware\nCryptoMix-Backup",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-CK" [label="ransomware\nCryptoMix-CK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Coban" [label="ransomware\nCryptoMix-Coban",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-DLL" [label="ransomware\nCryptoMix-DLL",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Empty" [label="ransomware\nCryptoMix-Empty",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Error" [label="ransomware\nCryptoMix-Error",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Exte" [label="ransomware\nCryptoMix-Exte",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-FILE" [label="ransomware\nCryptomix-FILE",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-MOLE66" [label="ransomware\nCryptoMix-MOLE66",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Noob" [label="ransomware\nCryptoMix-Noob",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Ogonia" [label="ransomware\nCryptoMix-Ogonia",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Pirate" [label="ransomware\nCryptoMix-Pirate",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Revenge" [label="ransomware\nCryptoMix-Revenge",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-SERVER" [label="ransomware\nCryptomix-SERVER",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-System" [label="ransomware\nCryptoMix-System",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Tastylock" [label="ransomware\nCryptoMix-Tastylock",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Test" [label="ransomware\nCryptoMix-Test",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Wallet" [label="ransomware\nCryptoMix-Wallet",shape=box,style=filled,color=deepskyblue];"ransomware=Cryptomix-WORK" [label="ransomware\nCryptomix-WORK",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-x1881" [label="ransomware\nCryptoMix-x1881",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-XZZX" [label="ransomware\nCryptoMix-XZZX",shape=box,style=filled,color=deepskyblue];"ransomware=CryptoMix-Zayka" [label="ransomware\nCryptoMix-Zayka",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/fc5ee56f-3cd1-4120-9b33-48993987d98d.png b/static/graphs/fc5ee56f-3cd1-4120-9b33-48993987d98d.png new file mode 100644 index 0000000..67fa722 Binary files /dev/null and b/static/graphs/fc5ee56f-3cd1-4120-9b33-48993987d98d.png differ diff --git a/static/graphs/fcbe8424-eb3e-4794-b76d-e743f5a49b8b b/static/graphs/fcbe8424-eb3e-4794-b76d-e743f5a49b8b new file mode 100644 index 0000000..4d16ec7 --- /dev/null +++ b/static/graphs/fcbe8424-eb3e-4794-b76d-e743f5a49b8b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Data Encoding Mitigation - T1132" [label="mitre-enterprise-attack-course-of-action\nData Encoding Mitigation - T1132",shape=ellipse];"mitre-enterprise-attack-course-of-action=Data Encoding Mitigation - T1132" -> "mitre-enterprise-attack-attack-pattern=Data Encoding - T1132" [label="mitigates",];} diff --git a/static/graphs/fcbe8424-eb3e-4794-b76d-e743f5a49b8b.png b/static/graphs/fcbe8424-eb3e-4794-b76d-e743f5a49b8b.png new file mode 100644 index 0000000..83480b1 Binary files /dev/null and b/static/graphs/fcbe8424-eb3e-4794-b76d-e743f5a49b8b.png differ diff --git a/static/graphs/fcdfd4af-da35-49a8-9610-19be8a487185 b/static/graphs/fcdfd4af-da35-49a8-9610-19be8a487185 new file mode 100644 index 0000000..08d0b4c --- /dev/null +++ b/static/graphs/fcdfd4af-da35-49a8-9610-19be8a487185 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"botnet=Mirai" [label="botnet\nMirai",shape=box,style=filled,color=deepskyblue];"botnet=Mirai" -> "tool=Mirai" [label="similar",dir="both"];"botnet=Mirai" -> "malpedia=Mirai (ELF)" [label="similar",dir="both"];"botnet=Mirai" -> "botnet=Owari" [label="variant-of",];"botnet=Mirai" -> "botnet=Sora" [label="variant-of",];"botnet=Owari" [label="botnet\nOwari",shape=box,style=filled,color=deepskyblue];"botnet=Owari" -> "malpedia=Owari" [label="similar",dir="both"];"botnet=Owari" -> "botnet=Mirai" [label="variant-of",];"botnet=Owari" -> "tool=Mirai" [label="variant-of",];"botnet=Owari" -> "botnet=Sora" [label="variant-of",];"botnet=Sora" [label="botnet\nSora",shape=box,style=filled,color=deepskyblue];"botnet=Sora" -> "botnet=Mirai" [label="variant-of",];"botnet=Sora" -> "tool=Mirai" [label="variant-of",];"botnet=Sora" -> "botnet=Owari" [label="variant-of",];"tool=Mirai" [label="tool\nMirai",shape=box,style=filled,color=deepskyblue];"tool=Mirai" -> "botnet=Owari" [label="variant-of",];"tool=Mirai" -> "botnet=Sora" [label="variant-of",];} diff --git a/static/graphs/fcdfd4af-da35-49a8-9610-19be8a487185.png b/static/graphs/fcdfd4af-da35-49a8-9610-19be8a487185.png new file mode 100644 index 0000000..c52c429 Binary files /dev/null and b/static/graphs/fcdfd4af-da35-49a8-9610-19be8a487185.png differ diff --git a/static/graphs/fd19bd82-1b14-49a1-a176-6cdc46b8a826 b/static/graphs/fd19bd82-1b14-49a1-a176-6cdc46b8a826 new file mode 100644 index 0000000..6158374 --- /dev/null +++ b/static/graphs/fd19bd82-1b14-49a1-a176-6cdc46b8a826 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=FIN8 - G0061" [label="mitre-enterprise-attack-intrusion-set\nFIN8 - G0061",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=FIN8 - G0061" -> "threat-actor=FIN8" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=FIN8 - G0061" -> "mitre-enterprise-attack-attack-pattern=Windows Admin Shares - T1077" [label="uses",];"threat-actor=FIN8" [label="threat-actor\nFIN8",shape=octagon,style=filled,color=indianred1];} diff --git a/static/graphs/fd19bd82-1b14-49a1-a176-6cdc46b8a826.png b/static/graphs/fd19bd82-1b14-49a1-a176-6cdc46b8a826.png new file mode 100644 index 0000000..9140482 Binary files /dev/null and b/static/graphs/fd19bd82-1b14-49a1-a176-6cdc46b8a826.png differ diff --git a/static/graphs/fdb1ae84-7b00-4d3d-b7dc-c774beef6425 b/static/graphs/fdb1ae84-7b00-4d3d-b7dc-c774beef6425 new file mode 100644 index 0000000..dba2161 --- /dev/null +++ b/static/graphs/fdb1ae84-7b00-4d3d-b7dc-c774beef6425 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Account Manipulation Mitigation - T1098" [label="mitre-enterprise-attack-course-of-action\nAccount Manipulation Mitigation - T1098",shape=ellipse];"mitre-enterprise-attack-course-of-action=Account Manipulation Mitigation - T1098" -> "mitre-enterprise-attack-attack-pattern=Account Manipulation - T1098" [label="mitigates",];} diff --git a/static/graphs/fdb1ae84-7b00-4d3d-b7dc-c774beef6425.png b/static/graphs/fdb1ae84-7b00-4d3d-b7dc-c774beef6425.png new file mode 100644 index 0000000..816dd28 Binary files /dev/null and b/static/graphs/fdb1ae84-7b00-4d3d-b7dc-c774beef6425.png differ diff --git a/static/graphs/fde50aaa-f5de-4cb8-989a-babb57d6a704 b/static/graphs/fde50aaa-f5de-4cb8-989a-babb57d6a704 new file mode 100644 index 0000000..1dbdbeb --- /dev/null +++ b/static/graphs/fde50aaa-f5de-4cb8-989a-babb57d6a704 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Net Crawler - S0056" [label="mitre-enterprise-attack-malware\nNet Crawler - S0056",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Net Crawler - S0056" -> "malpedia=NetC" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Net Crawler - S0056" -> "mitre-enterprise-attack-attack-pattern=Windows Admin Shares - T1077" [label="uses",];} diff --git a/static/graphs/fde50aaa-f5de-4cb8-989a-babb57d6a704.png b/static/graphs/fde50aaa-f5de-4cb8-989a-babb57d6a704.png new file mode 100644 index 0000000..dcf4ada Binary files /dev/null and b/static/graphs/fde50aaa-f5de-4cb8-989a-babb57d6a704.png differ diff --git a/static/graphs/fe0aeb41-1a51-4152-8467-628256ea6adf b/static/graphs/fe0aeb41-1a51-4152-8467-628256ea6adf new file mode 100644 index 0000000..8280445 --- /dev/null +++ b/static/graphs/fe0aeb41-1a51-4152-8467-628256ea6adf @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Modify Existing Service Mitigation - T1031" [label="mitre-enterprise-attack-course-of-action\nModify Existing Service Mitigation - T1031",shape=ellipse];"mitre-enterprise-attack-course-of-action=Modify Existing Service Mitigation - T1031" -> "mitre-enterprise-attack-attack-pattern=Modify Existing Service - T1031" [label="mitigates",];} diff --git a/static/graphs/fe0aeb41-1a51-4152-8467-628256ea6adf.png b/static/graphs/fe0aeb41-1a51-4152-8467-628256ea6adf.png new file mode 100644 index 0000000..f9dace7 Binary files /dev/null and b/static/graphs/fe0aeb41-1a51-4152-8467-628256ea6adf.png differ diff --git a/static/graphs/fe16edbe-3050-4276-bac3-c7ff5fd4174a b/static/graphs/fe16edbe-3050-4276-bac3-c7ff5fd4174a new file mode 100644 index 0000000..c88a279 --- /dev/null +++ b/static/graphs/fe16edbe-3050-4276-bac3-c7ff5fd4174a @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"ransomware=Globe3 Ransomware" [label="ransomware\nGlobe3 Ransomware",shape=box,style=filled,color=deepskyblue];"ransomware=Globe3 Ransomware" -> "ransomware=Globe2 Ransomware" [label="similar",dir="both"];"ransomware=Globe2 Ransomware" [label="ransomware\nGlobe2 Ransomware",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/fe16edbe-3050-4276-bac3-c7ff5fd4174a.png b/static/graphs/fe16edbe-3050-4276-bac3-c7ff5fd4174a.png new file mode 100644 index 0000000..eabc6ee Binary files /dev/null and b/static/graphs/fe16edbe-3050-4276-bac3-c7ff5fd4174a.png differ diff --git a/static/graphs/fe97ace3-9a80-42af-9eae-1f9245927e5d b/static/graphs/fe97ace3-9a80-42af-9eae-1f9245927e5d new file mode 100644 index 0000000..394fda4 --- /dev/null +++ b/static/graphs/fe97ace3-9a80-42af-9eae-1f9245927e5d @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=POORAIM" [label="tool\nPOORAIM",shape=box,style=filled,color=deepskyblue];"tool=POORAIM" -> "mitre-enterprise-attack-malware=POORAIM - S0216" [label="similar",dir="both"];"mitre-enterprise-attack-malware=POORAIM - S0216" [label="mitre-enterprise-attack-malware\nPOORAIM - S0216",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=POORAIM - S0216" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];} diff --git a/static/graphs/fe97ace3-9a80-42af-9eae-1f9245927e5d.png b/static/graphs/fe97ace3-9a80-42af-9eae-1f9245927e5d.png new file mode 100644 index 0000000..b55fae4 Binary files /dev/null and b/static/graphs/fe97ace3-9a80-42af-9eae-1f9245927e5d.png differ diff --git a/static/graphs/fe98767f-9df8-42b9-83c9-004b1dec8647 b/static/graphs/fe98767f-9df8-42b9-83c9-004b1dec8647 new file mode 100644 index 0000000..ec53126 --- /dev/null +++ b/static/graphs/fe98767f-9df8-42b9-83c9-004b1dec8647 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-intrusion-set=PittyTiger - G0011" [label="mitre-enterprise-attack-intrusion-set\nPittyTiger - G0011",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=PittyTiger - G0011" -> "threat-actor=Pitty Panda" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=PittyTiger - G0011" -> "mitre-enterprise-attack-tool=Mimikatz - S0002" [label="uses",];"mitre-enterprise-attack-tool=Mimikatz - S0002" [label="mitre-enterprise-attack-tool\nMimikatz - S0002",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=Mimikatz - S0002" -> "tool=Mimikatz" [label="similar",dir="both"];"mitre-enterprise-attack-tool=Mimikatz - S0002" -> "mitre-enterprise-attack-attack-pattern=Credential Dumping - T1003" [label="uses",];"threat-actor=Pitty Panda" [label="threat-actor\nPitty Panda",shape=octagon,style=filled,color=indianred1];"tool=Mimikatz" [label="tool\nMimikatz",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/fe98767f-9df8-42b9-83c9-004b1dec8647.png b/static/graphs/fe98767f-9df8-42b9-83c9-004b1dec8647.png new file mode 100644 index 0000000..a5cce7f Binary files /dev/null and b/static/graphs/fe98767f-9df8-42b9-83c9-004b1dec8647.png differ diff --git a/static/graphs/feac86e4-6bb2-4ba0-ac99-806aeb0a776c b/static/graphs/feac86e4-6bb2-4ba0-ac99-806aeb0a776c new file mode 100644 index 0000000..dd4d55c --- /dev/null +++ b/static/graphs/feac86e4-6bb2-4ba0-ac99-806aeb0a776c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"threat-actor=ELECTRUM" [label="threat-actor\nELECTRUM",shape=octagon,style=filled,color=indianred1];"threat-actor=ELECTRUM" -> "mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" [label="similar",dir="both"];"threat-actor=ELECTRUM" -> "threat-actor=Sandworm" [label="similar",dir="both"];"threat-actor=ELECTRUM" -> "threat-actor=TeleBots" [label="similar",dir="both"];"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" [label="mitre-enterprise-attack-intrusion-set\nSandworm Team - G0034",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-intrusion-set=Sandworm Team - G0034" -> "mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="uses",];"threat-actor=Sandworm" [label="threat-actor\nSandworm",shape=octagon,style=filled,color=indianred1];"threat-actor=Sandworm" -> "threat-actor=GreyEnergy" [label="similar",dir="both"];"threat-actor=TeleBots" [label="threat-actor\nTeleBots",shape=octagon,style=filled,color=indianred1];"mitre-enterprise-attack-malware=BlackEnergy - S0089" [label="mitre-enterprise-attack-malware\nBlackEnergy - S0089",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "tool=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "malpedia=BlackEnergy" [label="similar",dir="both"];"mitre-enterprise-attack-malware=BlackEnergy - S0089" -> "mitre-enterprise-attack-attack-pattern=Registry Run Keys / Start Folder - T1060" [label="uses",];"threat-actor=GreyEnergy" [label="threat-actor\nGreyEnergy",shape=octagon,style=filled,color=indianred1];"tool=BlackEnergy" [label="tool\nBlackEnergy",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/feac86e4-6bb2-4ba0-ac99-806aeb0a776c.png b/static/graphs/feac86e4-6bb2-4ba0-ac99-806aeb0a776c.png new file mode 100644 index 0000000..7bbe2d5 Binary files /dev/null and b/static/graphs/feac86e4-6bb2-4ba0-ac99-806aeb0a776c.png differ diff --git a/static/graphs/fece06b7-d4b1-42cf-b81a-5323c917546e b/static/graphs/fece06b7-d4b1-42cf-b81a-5323c917546e new file mode 100644 index 0000000..386a5c7 --- /dev/null +++ b/static/graphs/fece06b7-d4b1-42cf-b81a-5323c917546e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=FALLCHILL - S0181" [label="mitre-enterprise-attack-malware\nFALLCHILL - S0181",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=FALLCHILL - S0181" -> "rat=FALLCHILL" [label="similar",dir="both"];"mitre-enterprise-attack-malware=FALLCHILL - S0181" -> "malpedia=Volgmer" [label="similar",dir="both"];"mitre-enterprise-attack-malware=FALLCHILL - S0181" -> "tool=Volgmer" [label="similar",dir="both"];"mitre-enterprise-attack-malware=FALLCHILL - S0181" -> "mitre-enterprise-attack-attack-pattern=System Network Configuration Discovery - T1016" [label="uses",];"rat=FALLCHILL" [label="rat\nFALLCHILL",shape=box,style=filled,color=deepskyblue];"tool=Volgmer" [label="tool\nVolgmer",shape=box,style=filled,color=deepskyblue];"tool=Volgmer" -> "mitre-enterprise-attack-malware=Volgmer - S0180" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Volgmer - S0180" [label="mitre-enterprise-attack-malware\nVolgmer - S0180",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Volgmer - S0180" -> "mitre-enterprise-attack-attack-pattern=Standard Cryptographic Protocol - T1032" [label="uses",];} diff --git a/static/graphs/fece06b7-d4b1-42cf-b81a-5323c917546e.png b/static/graphs/fece06b7-d4b1-42cf-b81a-5323c917546e.png new file mode 100644 index 0000000..854083e Binary files /dev/null and b/static/graphs/fece06b7-d4b1-42cf-b81a-5323c917546e.png differ diff --git a/static/graphs/ff00fa92-b32e-46b6-88ca-98357ebe3f54 b/static/graphs/ff00fa92-b32e-46b6-88ca-98357ebe3f54 new file mode 100644 index 0000000..ea0c360 --- /dev/null +++ b/static/graphs/ff00fa92-b32e-46b6-88ca-98357ebe3f54 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=ZeroT" [label="tool\nZeroT",shape=box,style=filled,color=deepskyblue];"tool=ZeroT" -> "mitre-enterprise-attack-malware=ZeroT - S0230" [label="similar",dir="both"];"tool=ZeroT" -> "malpedia=ZeroT" [label="similar",dir="both"];"mitre-enterprise-attack-malware=ZeroT - S0230" [label="mitre-enterprise-attack-malware\nZeroT - S0230",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=ZeroT - S0230" -> "mitre-enterprise-attack-attack-pattern=Standard Cryptographic Protocol - T1032" [label="uses",];} diff --git a/static/graphs/ff00fa92-b32e-46b6-88ca-98357ebe3f54.png b/static/graphs/ff00fa92-b32e-46b6-88ca-98357ebe3f54.png new file mode 100644 index 0000000..83f9902 Binary files /dev/null and b/static/graphs/ff00fa92-b32e-46b6-88ca-98357ebe3f54.png differ diff --git a/static/graphs/ff0404a1-465f-4dd5-8b66-ee773628ca64 b/static/graphs/ff0404a1-465f-4dd5-8b66-ee773628ca64 new file mode 100644 index 0000000..0bd7b43 --- /dev/null +++ b/static/graphs/ff0404a1-465f-4dd5-8b66-ee773628ca64 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"tool=Hancitor" [label="tool\nHancitor",shape=box,style=filled,color=deepskyblue];"tool=Hancitor" -> "malpedia=Hancitor" [label="similar",dir="both"];"tool=Hancitor" -> "malpedia=Pony" [label="similar",dir="both"];"tool=Hancitor" -> "tool=Fareit" [label="similar",dir="both"];"tool=Fareit" [label="tool\nFareit",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ff0404a1-465f-4dd5-8b66-ee773628ca64.png b/static/graphs/ff0404a1-465f-4dd5-8b66-ee773628ca64.png new file mode 100644 index 0000000..01adc65 Binary files /dev/null and b/static/graphs/ff0404a1-465f-4dd5-8b66-ee773628ca64.png differ diff --git a/static/graphs/ff471870-7c9a-4122-ba89-489fc819660b b/static/graphs/ff471870-7c9a-4122-ba89-489fc819660b new file mode 100644 index 0000000..7ebde96 --- /dev/null +++ b/static/graphs/ff471870-7c9a-4122-ba89-489fc819660b @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"rat=SharK" [label="rat\nSharK",shape=box,style=filled,color=deepskyblue];"rat=SharK" -> "ransomware=Shark" [label="similar",dir="both"];"ransomware=Shark" [label="ransomware\nShark",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ff471870-7c9a-4122-ba89-489fc819660b.png b/static/graphs/ff471870-7c9a-4122-ba89-489fc819660b.png new file mode 100644 index 0000000..a4a1e63 Binary files /dev/null and b/static/graphs/ff471870-7c9a-4122-ba89-489fc819660b.png differ diff --git a/static/graphs/ff4821f6-5afb-481b-8c0f-26c28c0d666c b/static/graphs/ff4821f6-5afb-481b-8c0f-26c28c0d666c new file mode 100644 index 0000000..b6d4d67 --- /dev/null +++ b/static/graphs/ff4821f6-5afb-481b-8c0f-26c28c0d666c @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-course-of-action=Attestation - MOB-M1002" [label="mitre-mobile-attack-course-of-action\nAttestation - MOB-M1002",shape=ellipse];"mitre-mobile-attack-course-of-action=Attestation - MOB-M1002" -> "mitre-mobile-attack-attack-pattern=Modify OS Kernel or Boot Partition - MOB-T1001" [label="mitigates",];} diff --git a/static/graphs/ff4821f6-5afb-481b-8c0f-26c28c0d666c.png b/static/graphs/ff4821f6-5afb-481b-8c0f-26c28c0d666c.png new file mode 100644 index 0000000..2f074bd Binary files /dev/null and b/static/graphs/ff4821f6-5afb-481b-8c0f-26c28c0d666c.png differ diff --git a/static/graphs/ff5d862a-ae6b-4833-8c15-e235d654d28e b/static/graphs/ff5d862a-ae6b-4833-8c15-e235d654d28e new file mode 100644 index 0000000..907f7ea --- /dev/null +++ b/static/graphs/ff5d862a-ae6b-4833-8c15-e235d654d28e @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-course-of-action=Component Object Model Hijacking Mitigation - T1122" [label="mitre-enterprise-attack-course-of-action\nComponent Object Model Hijacking Mitigation - T1122",shape=ellipse];"mitre-enterprise-attack-course-of-action=Component Object Model Hijacking Mitigation - T1122" -> "mitre-enterprise-attack-attack-pattern=Component Object Model Hijacking - T1122" [label="mitigates",];} diff --git a/static/graphs/ff5d862a-ae6b-4833-8c15-e235d654d28e.png b/static/graphs/ff5d862a-ae6b-4833-8c15-e235d654d28e.png new file mode 100644 index 0000000..2ec4f20 Binary files /dev/null and b/static/graphs/ff5d862a-ae6b-4833-8c15-e235d654d28e.png differ diff --git a/static/graphs/ff6840c9-4c87-4d07-bbb6-9f50aa33d498 b/static/graphs/ff6840c9-4c87-4d07-bbb6-9f50aa33d498 new file mode 100644 index 0000000..5beecd5 --- /dev/null +++ b/static/graphs/ff6840c9-4c87-4d07-bbb6-9f50aa33d498 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-malware=Flame - S0143" [label="mitre-enterprise-attack-malware\nFlame - S0143",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-malware=Flame - S0143" -> "tool=Flame" [label="similar",dir="both"];"mitre-enterprise-attack-malware=Flame - S0143" -> "mitre-enterprise-attack-attack-pattern=Audio Capture - T1123" [label="uses",];"tool=Flame" [label="tool\nFlame",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ff6840c9-4c87-4d07-bbb6-9f50aa33d498.png b/static/graphs/ff6840c9-4c87-4d07-bbb6-9f50aa33d498.png new file mode 100644 index 0000000..e7f49c7 Binary files /dev/null and b/static/graphs/ff6840c9-4c87-4d07-bbb6-9f50aa33d498.png differ diff --git a/static/graphs/ff6caf67-ea1f-4895-b80e-4bb0fc31c6db b/static/graphs/ff6caf67-ea1f-4895-b80e-4bb0fc31c6db new file mode 100644 index 0000000..f2078db --- /dev/null +++ b/static/graphs/ff6caf67-ea1f-4895-b80e-4bb0fc31c6db @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-enterprise-attack-tool=PsExec - S0029" [label="mitre-enterprise-attack-tool\nPsExec - S0029",shape=box,style=filled,color=deepskyblue];"mitre-enterprise-attack-tool=PsExec - S0029" -> "tool=PsExec" [label="similar",dir="both"];"mitre-enterprise-attack-tool=PsExec - S0029" -> "mitre-enterprise-attack-attack-pattern=Windows Admin Shares - T1077" [label="uses",];"tool=PsExec" [label="tool\nPsExec",shape=box,style=filled,color=deepskyblue];} diff --git a/static/graphs/ff6caf67-ea1f-4895-b80e-4bb0fc31c6db.png b/static/graphs/ff6caf67-ea1f-4895-b80e-4bb0fc31c6db.png new file mode 100644 index 0000000..0e2e79d Binary files /dev/null and b/static/graphs/ff6caf67-ea1f-4895-b80e-4bb0fc31c6db.png differ diff --git a/static/graphs/ff742eeb-1f90-4f5a-8b92-9d40fffd99ca b/static/graphs/ff742eeb-1f90-4f5a-8b92-9d40fffd99ca new file mode 100644 index 0000000..730afde --- /dev/null +++ b/static/graphs/ff742eeb-1f90-4f5a-8b92-9d40fffd99ca @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"mitre-mobile-attack-malware=DressCode - MOB-S0016" [label="mitre-mobile-attack-malware\nDressCode - MOB-S0016",shape=box,style=filled,color=deepskyblue];"mitre-mobile-attack-malware=DressCode - MOB-S0016" -> "mitre-mobile-attack-attack-pattern=Exploit Enterprise Resources - MOB-T1031" [label="uses",];} diff --git a/static/graphs/ff742eeb-1f90-4f5a-8b92-9d40fffd99ca.png b/static/graphs/ff742eeb-1f90-4f5a-8b92-9d40fffd99ca.png new file mode 100644 index 0000000..9ef47dd Binary files /dev/null and b/static/graphs/ff742eeb-1f90-4f5a-8b92-9d40fffd99ca.png differ diff --git a/static/graphs/ffbbbc14-1cdb-4be9-a631-ed53c5407369 b/static/graphs/ffbbbc14-1cdb-4be9-a631-ed53c5407369 new file mode 100644 index 0000000..bed9f3c --- /dev/null +++ b/static/graphs/ffbbbc14-1cdb-4be9-a631-ed53c5407369 @@ -0,0 +1,2 @@ +digraph { +concentrate=true;overlap=scale;"banker=Gozi ISFB" [label="banker\nGozi ISFB",shape=box,style=filled,color=deepskyblue];"banker=Gozi ISFB" -> "malpedia=ISFB" [label="similar",dir="both"];} diff --git a/static/graphs/ffbbbc14-1cdb-4be9-a631-ed53c5407369.png b/static/graphs/ffbbbc14-1cdb-4be9-a631-ed53c5407369.png new file mode 100644 index 0000000..5d4ebf6 Binary files /dev/null and b/static/graphs/ffbbbc14-1cdb-4be9-a631-ed53c5407369.png differ