# Explanation To enable branching in attack narratives, enable scenarios to be nested under each other. - To present the graph of the parent, or children scenarios: Begin with the parent, and then branch into the children routes - To present the threat matrix deliverable: Make a narrative combining the parent with each branch ## Example - Parent: Attacker achieves initial access through a hardware implant and is able to capture relayed domain credentials - Child1: Attacker utilizes relayed domain credential to abuse ADCS misconfigurations and execute a DCSync - Child2: Attacker utilizes relayed domain credential to abuse CVE-2021-36942, gain DA privileges, and deploy ransomware to environment ### Graph ```mermaid graph TD; Parent1-->Child1; Parent1-->Child2; ``` ### Threat Matrix | ID | Name | | -- | ---- | | Scenario 1| Hardware Implant to DCSync| |Scenario 2| Hardware Implant to Ransomware|
Explanation
To enable branching in attack narratives, enable scenarios to be nested under each other.
Example
Graph
graph TD; Parent1-->Child1; Parent1-->Child2;Threat Matrix