misp-website/static/graphs/e6c09b63-a424-4d9e-b7f7-b75...

3 lines
1.0 KiB
Plaintext

digraph {
concentrate=true;overlap=scale;"ransomware=BlackCat" [label="ransomware\nBlackCat",shape=box,style=filled,color=deepskyblue];"ransomware=BlackCat" -> "mitre-enterprise-attack-attack-pattern=Windows Management Instrumentation - T1047" [label="uses",];"ransomware=BlackCat" -> "mitre-enterprise-attack-attack-pattern=Execution through Module Load - T1129" [label="uses",];"ransomware=BlackCat" -> "mitre-enterprise-attack-attack-pattern=Modify Registry - T1112" [label="uses",];"ransomware=BlackCat" -> "mitre-enterprise-attack-attack-pattern=System Information Discovery - T1082" [label="uses",];"ransomware=BlackCat" -> "mitre-enterprise-attack-attack-pattern=System Network Connections Discovery - T1049" [label="uses",];"ransomware=BlackCat" -> "mitre-enterprise-attack-attack-pattern=Remote File Copy - T1105" [label="uses",];"ransomware=BlackCat" -> "mitre-enterprise-attack-attack-pattern=Process Discovery - T1057" [label="uses",];"ransomware=BlackCat" -> "mitre-enterprise-attack-attack-pattern=File and Directory Discovery - T1083" [label="uses",];}