{
  "name": "幼象攻击事件",
  "timeline": [
    {
      "text": "攻击时间：2018年10月",
      "row": 1
    }
  ],
  "nodes": [
    {
      "id": "1",
      "row": 1,
      "column": 1,
      "name": "External attackers",
      "type": "sequence_person"
    },
    {
      "id": "2",
      "row": 1,
      "column": 2,
      "name": "User terminals for intranets",
      "type": "sequence_asset",
      "state": "Loss of confidentiality",
      "state_type": 2
    },
    {
      "id": "3",
      "row": 2,
      "column": 2,
      "name": "User terminals for intranets",
      "type": "sequence_asset",
      "state": "Invaded",
      "state_type": 2
    },
    {
      "id": "4",
      "row": 2,
      "column": 3,
      "name": "User USB flash drive in the intranet",
      "type": "sequence_component",
      "state": "Loss of confidentiality",
      "state_type": 2
    },
    {
      "id": "5",
      "row": 3,
      "column": 3,
      "name": "Other user terminals in the intranet",
      "type": "sequence_asset",
      "state": "Loss of confidentiality",
      "state_type": 2
    },
    {
      "id": "6",
      "row": 4,
      "column": 3,
      "name": "Other user terminals in the intranet",
      "type": "sequence_asset",
      "state": "Invaded",
      "state_type": 2
    },
    {
      "id": "7",
      "row": 4,
      "column": 4,
      "name": "User USB flash drive in isolated net",
      "type": "sequence_component",
      "state": "Loss of confidentiality",
      "state_type": 2
    },
    {
      "id": "8",
      "row": 5,
      "column": 4,
      "name": "Other consumer terminals in isolated net",
      "type": "sequence_asset",
      "state": "Loss of confidentiality",
      "state_type": 2
    },
    {
      "id": "9",
      "row": 6,
      "column": 4,
      "name": "Other consumer terminals in isolated net",
      "type": "sequence_asset",
      "state": "Invaded",
      "state_type": 2
    },
    {
      "id": "10",
      "row": 7,
      "column": 4,
      "name": "Other consumer terminals in isolated net",
      "type": "sequence_asset",
      "state": "Loss of confidentiality",
      "state_type": 2
    },
    {
      "id": "11",
      "row": 8,
      "column": 4,
      "name": "Other consumer terminals in isolated net",
      "type": "sequence_asset",
      "state": "Loss of confidentiality",
      "state_type": 2
    },
    {
      "id": "12",
      "row": 9,
      "column": 4,
      "name": "User USB flash drive in isolated net",
      "type": "sequence_component",
      "state": "Loss of confidentiality",
      "state_type": 2
    }
  ],
  "edges": [
    {
      "source": "1",
      "target": "2",
      "style_type": 1,
      "direction": "horizontal",
      "label": "Spread through phishing emails"
    },
    {
      "source": "1",
      "target": "3",
      "style_type": 1,
      "direction": "horizontal",
      "label": "Install the Empire remote control Trojan"
    },
    {
      "source": "3",
      "target": "4",
      "style_type": 2,
      "direction": "horizontal",
      "label": "Write a decoy file to newly accessed removable media"
    },
    {
      "source": "3",
      "target": "5",
      "style_type": 2,
      "direction": "horizontal",
      "label": "Access to an infected USB stick"
    },
    {
      "source": "3",
      "target": "6",
      "style_type": 2,
      "direction": "horizontal",
      "label": "The bait file is clicked to run"
    },
    {
      "source": "6",
      "target": "7",
      "style_type": 2,
      "direction": "horizontal",
      "label": "Write a decoy file to newly accessed removable media"
    },
    {
      "source": "6",
      "target": "8",
      "style_type": 2,
      "direction": "horizontal",
      "label": "Access to an infected USB stick"
    },
    {
      "source": "6",
      "target": "9",
      "style_type": 2,
      "direction": "horizontal",
      "label": "The bait file is clicked to run"
    },
    {
      "source": "6",
      "target": "10",
      "style_type": 2,
      "direction": "horizontal",
      "label": "Steal detailed system information and login credentials"
    },
    {
      "source": "6",
      "target": "11",
      "style_type": 2,
      "direction": "horizontal",
      "label": "Steal high-value document files"
    },
    {
      "source": "6",
      "target": "12",
      "style_type": 2,
      "direction": "horizontal",
      "label": "Write the stolen data to a hidden directory on a USB stick and wait to be carried out of the isolation net"
    }
  ]
}
