f15hb0wn commited on
Commit
0f46503
·
verified ·
1 Parent(s): f33cbd9

Upload per-incident GraphML sharded batch 23/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/d/d7b3a7b0-b752-11ed-808d-57d97cd084e1.graphml +63 -0
  2. graph/incidents_graphml/d/d7b618b0-b752-11ed-808d-57d97cd084e1.graphml +63 -0
  3. graph/incidents_graphml/d/d7ba1050-b752-11ed-808d-57d97cd084e1.graphml +63 -0
  4. graph/incidents_graphml/d/d7ba4a50-0cb8-11ee-9777-83d870147fdf.graphml +63 -0
  5. graph/incidents_graphml/d/d7c03b40-0983-11ef-a068-8dbaaaaf6c28.graphml +63 -0
  6. graph/incidents_graphml/d/d7c35f20-b752-11ed-808d-57d97cd084e1.graphml +63 -0
  7. graph/incidents_graphml/d/d7c63050-dfa2-11ee-9120-ff7b7094ac3d.graphml +77 -0
  8. graph/incidents_graphml/d/d7cdf810-17ea-11ee-98ae-3df0911cfade.graphml +63 -0
  9. graph/incidents_graphml/d/d7d05840-6bcc-11ee-ac23-0990c4be3eac.graphml +63 -0
  10. graph/incidents_graphml/d/d7dc9590-f058-11ee-abdc-892822517928.graphml +63 -0
  11. graph/incidents_graphml/d/d7e02080-17ea-11ee-98ae-3df0911cfade.graphml +63 -0
  12. graph/incidents_graphml/d/d7e19650-6bcc-11ee-ac23-0990c4be3eac.graphml +63 -0
  13. graph/incidents_graphml/d/d7eff680-f058-11ee-abdc-892822517928.graphml +63 -0
  14. graph/incidents_graphml/d/d7f41db0-17ea-11ee-98ae-3df0911cfade.graphml +63 -0
  15. graph/incidents_graphml/d/d7f54480-2111-11ee-bca7-0d1d0c9aa4ab.graphml +63 -0
  16. graph/incidents_graphml/d/d7ff86e0-f058-11ee-abdc-892822517928.graphml +63 -0
  17. graph/incidents_graphml/d/d80540f0-9562-11ed-94b8-8539433cb390.graphml +113 -0
  18. graph/incidents_graphml/d/d807d900-9562-11ed-94b8-8539433cb390.graphml +113 -0
  19. graph/incidents_graphml/d/d80c1280-17ea-11ee-98ae-3df0911cfade.graphml +63 -0
  20. graph/incidents_graphml/d/d80c1e10-d3dd-11ee-a6e5-2b3ad02f17a7.graphml +63 -0
  21. graph/incidents_graphml/d/d8125d30-5308-11ee-b63c-1beb4899e6f1.graphml +63 -0
  22. graph/incidents_graphml/d/d8143e30-2111-11ee-bca7-0d1d0c9aa4ab.graphml +63 -0
  23. graph/incidents_graphml/d/d814bd40-fb1b-11ed-895b-69b7bcd870e2.graphml +63 -0
  24. graph/incidents_graphml/d/d8161b80-a4a5-11ed-b478-67badd244434.graphml +77 -0
  25. graph/incidents_graphml/d/d81c0f90-f058-11ee-abdc-892822517928.graphml +63 -0
  26. graph/incidents_graphml/d/d81df860-d3dd-11ee-a6e5-2b3ad02f17a7.graphml +63 -0
  27. graph/incidents_graphml/d/d822a7a0-fe97-11ed-a08d-35e4f0a9a870.graphml +789 -0
  28. graph/incidents_graphml/d/d8231470-6ef3-11ee-ab20-4f1e630cbb02.graphml +63 -0
  29. graph/incidents_graphml/d/d8269f60-17ea-11ee-98ae-3df0911cfade.graphml +63 -0
  30. graph/incidents_graphml/d/d82ca830-2111-11ee-bca7-0d1d0c9aa4ab.graphml +63 -0
  31. graph/incidents_graphml/d/d82de9e0-f058-11ee-abdc-892822517928.graphml +63 -0
  32. graph/incidents_graphml/d/d82e96f0-29b7-11ee-b86f-6b6c9ebf54e6.graphml +63 -0
  33. graph/incidents_graphml/d/d8317630-0bf4-11ee-9b02-ffb3de173f5d.graphml +77 -0
  34. graph/incidents_graphml/d/d8320890-6ef3-11ee-ab20-4f1e630cbb02.graphml +63 -0
  35. graph/incidents_graphml/d/d8401ad0-17ea-11ee-98ae-3df0911cfade.graphml +63 -0
  36. graph/incidents_graphml/d/d8476f30-0bf4-11ee-9b02-ffb3de173f5d.graphml +77 -0
  37. graph/incidents_graphml/d/d84e2490-17ea-11ee-98ae-3df0911cfade.graphml +63 -0
  38. graph/incidents_graphml/d/d8628870-efe8-11ec-a293-5b334d10f0f6.graphml +149 -0
  39. graph/incidents_graphml/d/d865c7c0-ab6c-11ed-b288-05f5e2790b36.graphml +63 -0
  40. graph/incidents_graphml/d/d865e9d0-f058-11ee-abdc-892822517928.graphml +63 -0
  41. graph/incidents_graphml/d/d86ad0d0-ab6c-11ed-b288-05f5e2790b36.graphml +63 -0
  42. graph/incidents_graphml/d/d874ddf0-f058-11ee-abdc-892822517928.graphml +85 -0
  43. graph/incidents_graphml/d/d87af270-efe8-11ec-a293-5b334d10f0f6.graphml +77 -0
  44. graph/incidents_graphml/d/d87c5b80-0010-11ef-83c1-e54678fd0000.graphml +63 -0
  45. graph/incidents_graphml/d/d87e5da0-0cb8-11ee-9777-83d870147fdf.graphml +63 -0
  46. graph/incidents_graphml/d/d87f68c0-0010-11ef-83c1-e54678fd0000.graphml +63 -0
  47. graph/incidents_graphml/d/d880ef60-0010-11ef-83c1-e54678fd0000.graphml +63 -0
  48. graph/incidents_graphml/d/d8831240-0010-11ef-83c1-e54678fd0000.graphml +63 -0
  49. graph/incidents_graphml/d/d8850a90-f058-11ee-abdc-892822517928.graphml +63 -0
  50. graph/incidents_graphml/d/d8855c80-1e11-11ee-9177-87bbc2825325.graphml +257 -0
graph/incidents_graphml/d/d7b3a7b0-b752-11ed-808d-57d97cd084e1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e890d849-aa47-11ed-84a2-69fc67bfa5a4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">10.74.211.215</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="815bbee6-b5f2-11ed-823e-ab8e9bd6dd15">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.92.136</data>
43
+ <data key="n_hostname">100.64.92.136</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16902" target="HOST-18317">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1677580195</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d7b3a7b0-b752-11ed-808d-57d97cd084e1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7b618b0-b752-11ed-808d-57d97cd084e1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5511e8a1-9d8d-11ed-a0d9-bbd531499cbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.4.77</data>
35
+ <data key="n_hostname">100.64.4.77</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="e890d849-aa47-11ed-84a2-69fc67bfa5a4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.74.211.215</data>
43
+ <data key="n_hostname">10.74.211.215</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="5511e8a1-9d8d-11ed-a0d9-bbd531499cbc" target="HOST-16902">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1677580195</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d7b618b0-b752-11ed-808d-57d97cd084e1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7ba1050-b752-11ed-808d-57d97cd084e1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e890d849-aa47-11ed-84a2-69fc67bfa5a4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">10.74.211.215</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="5511e8a1-9d8d-11ed-a0d9-bbd531499cbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.4.77</data>
43
+ <data key="n_hostname">100.64.4.77</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16902" target="HOST-18318">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1677580195</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d7ba1050-b752-11ed-808d-57d97cd084e1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7ba4a50-0cb8-11ee-9777-83d870147fdf.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece4-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.101.1</data>
35
+ <data key="n_hostname">172.31.101.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f6aeca4-0627-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.23.218</data>
43
+ <data key="n_hostname">100.64.23.218</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2821" target="HOST-4989">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686969853</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d7ba4a50-0cb8-11ee-9777-83d870147fdf</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7c03b40-0983-11ef-a068-8dbaaaaf6c28.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.158.1</data>
35
+ <data key="n_hostname">172.29.158.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c2f45921-ec01-11ee-baf1-edae92a91d53">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.4.127</data>
43
+ <data key="n_hostname">100.64.4.127</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2858" target="c2f45921-ec01-11ee-baf1-edae92a91d53">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1714764733</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d7c03b40-0983-11ef-a068-8dbaaaaf6c28</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7c35f20-b752-11ed-808d-57d97cd084e1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2a422704-aabe-11ed-ad78-0d50fdff7d5f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.221.82.8</data>
35
+ <data key="n_hostname">10.221.82.8</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="abc14411-a10d-11ed-8f38-21a2b6490776">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.92.138</data>
43
+ <data key="n_hostname">100.64.92.138</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16909" target="abc14411-a10d-11ed-8f38-21a2b6490776">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1677580195</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d7c35f20-b752-11ed-808d-57d97cd084e1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7c63050-dfa2-11ee-9120-ff7b7094ac3d.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f66f9cf1-2ea7-11ee-8bb7-8d53d96c0461">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.22.152</data>
35
+ <data key="n_hostname">100.64.22.152</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.746875</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="1c04b057-0625-11ee-b3ca-a7be26d46ce3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.53</data>
43
+ <data key="n_hostname">100.64.68.53</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Protect","CASB"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11630" target="HOST-11433">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710160099</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.746875</data>
53
+ <data key="e_suspicion_score">0.746875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d7c63050-dfa2-11ee-9120-ff7b7094ac3d</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-11433" target="HOST-11630">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1710160099</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.746875</data>
67
+ <data key="e_suspicion_score">0.746875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">d7c63050-dfa2-11ee-9120-ff7b7094ac3d</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/d/d7cdf810-17ea-11ee-98ae-3df0911cfade.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="261dbd13-0644-11ee-9bd9-51b109f6b127">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.78.27</data>
35
+ <data key="n_hostname">100.64.78.27</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="261dbd13-0644-11ee-9bd9-51b109f6b127" target="HOST-13083">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688200790</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d7cdf810-17ea-11ee-98ae-3df0911cfade</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7d05840-6bcc-11ee-ac23-0990c4be3eac.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="78f89312-3d18-11ee-a3b4-dd6d896c4241">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.54.255</data>
35
+ <data key="n_hostname">100.64.54.255</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.27.202.53</data>
43
+ <data key="n_hostname">172.27.202.53</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="78f89312-3d18-11ee-a3b4-dd6d896c4241" target="HOST-2703">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697423803</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d7d05840-6bcc-11ee-ac23-0990c4be3eac</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7dc9590-f058-11ee-abdc-892822517928.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.27.202.53</data>
35
+ <data key="n_hostname">172.27.202.53</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="0c2fde60-0653-11ee-a271-41781231d148">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.33.22</data>
43
+ <data key="n_hostname">USER-0015-1296.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2703" target="HOST-6289">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1711997486</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d7dc9590-f058-11ee-abdc-892822517928</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7e02080-17ea-11ee-98ae-3df0911cfade.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="261dbd13-0644-11ee-9bd9-51b109f6b127">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.78.27</data>
43
+ <data key="n_hostname">100.64.78.27</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-13083" target="HOST-15226">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688200790</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d7e02080-17ea-11ee-98ae-3df0911cfade</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7e19650-6bcc-11ee-ac23-0990c4be3eac.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.27.202.53</data>
35
+ <data key="n_hostname">172.27.202.53</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="78f89312-3d18-11ee-a3b4-dd6d896c4241">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.54.255</data>
43
+ <data key="n_hostname">100.64.54.255</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2703" target="HOST-9453">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697423803</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d7e19650-6bcc-11ee-ac23-0990c4be3eac</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7eff680-f058-11ee-abdc-892822517928.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="97636251-062a-11ee-8860-f951c26910c1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.201.119</data>
35
+ <data key="n_hostname">172.30.201.119</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2c75d7e1-aabf-11ee-9e8d-b329cf48d7f5">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.35.225</data>
43
+ <data key="n_hostname">100.64.35.225</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2760" target="2c75d7e1-aabf-11ee-9e8d-b329cf48d7f5">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1711997486</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d7eff680-f058-11ee-abdc-892822517928</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7f41db0-17ea-11ee-98ae-3df0911cfade.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="62d22051-0637-11ee-9d16-b90ac473a2f2">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.74.60</data>
35
+ <data key="n_hostname">100.64.74.60</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="62d22051-0637-11ee-9d16-b90ac473a2f2" target="HOST-13083">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688200790</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d7f41db0-17ea-11ee-98ae-3df0911cfade</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7f54480-2111-11ee-bca7-0d1d0c9aa4ab.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a2c58762-07ea-11ee-9aab-47a3979078e7">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.48.146</data>
35
+ <data key="n_hostname">100.64.48.146</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f4-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.135.251.191</data>
43
+ <data key="n_hostname">10.135.251.191</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="a2c58762-07ea-11ee-9aab-47a3979078e7" target="HOST-2751">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689207101</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d7f54480-2111-11ee-bca7-0d1d0c9aa4ab</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d7ff86e0-f058-11ee-abdc-892822517928.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.86.34</data>
35
+ <data key="n_hostname">172.23.86.34</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2029e470-062f-11ee-978b-f374a5593a56">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.110</data>
43
+ <data key="n_hostname">100.64.8.110</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2717" target="HOST-2892">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1711997486</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d7ff86e0-f058-11ee-abdc-892822517928</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d80540f0-9562-11ed-94b8-8539433cb390.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c992aa20-eb86-11ec-988c-a192e0d8ce11">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.34</data>
35
+ <data key="n_hostname">100.64.18.34</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="ec1243f0-41a6-11ed-a587-21753cf039e4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.253</data>
43
+ <data key="n_hostname">100.64.70.253</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <node id="dbad3960-41a7-11ed-a587-21753cf039e4">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.76.246</data>
51
+ <data key="n_hostname">100.64.76.246</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="c992aa20-eb86-11ec-988c-a192e0d8ce11" target="HOST-12974">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1673848728</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">d80540f0-9562-11ed-94b8-8539433cb390</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-12974" target="c992aa20-eb86-11ec-988c-a192e0d8ce11">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1673848728</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">d80540f0-9562-11ed-94b8-8539433cb390</data>
83
+ </edge>
84
+ <edge id="e3" source="c992aa20-eb86-11ec-988c-a192e0d8ce11" target="dbad3960-41a7-11ed-a587-21753cf039e4">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1673848728</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">d80540f0-9562-11ed-94b8-8539433cb390</data>
97
+ </edge>
98
+ <edge id="e4" source="dbad3960-41a7-11ed-a587-21753cf039e4" target="c992aa20-eb86-11ec-988c-a192e0d8ce11">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1673848728</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">d80540f0-9562-11ed-94b8-8539433cb390</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/d/d807d900-9562-11ed-94b8-8539433cb390.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b6f6bab1-9562-11ed-99ce-6bb4fe9160a0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.78.162</data>
35
+ <data key="n_hostname">100.64.78.162</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="41e8a4e0-0d4a-11ed-869f-2faabe2b5955">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.170</data>
43
+ <data key="n_hostname">100.64.72.170</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <node id="8edcb824-56c1-11ed-9816-91a970ae38ce">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.78.163</data>
51
+ <data key="n_hostname">100.64.78.163</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <edge id="e1" source="b6f6bab1-9562-11ed-99ce-6bb4fe9160a0" target="41e8a4e0-0d4a-11ed-869f-2faabe2b5955">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1673848728</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">d807d900-9562-11ed-94b8-8539433cb390</data>
69
+ </edge>
70
+ <edge id="e2" source="41e8a4e0-0d4a-11ed-869f-2faabe2b5955" target="b6f6bab1-9562-11ed-99ce-6bb4fe9160a0">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1673848728</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">d807d900-9562-11ed-94b8-8539433cb390</data>
83
+ </edge>
84
+ <edge id="e3" source="8edcb824-56c1-11ed-9816-91a970ae38ce" target="41e8a4e0-0d4a-11ed-869f-2faabe2b5955">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1673848728</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">d807d900-9562-11ed-94b8-8539433cb390</data>
97
+ </edge>
98
+ <edge id="e4" source="41e8a4e0-0d4a-11ed-869f-2faabe2b5955" target="8edcb824-56c1-11ed-9816-91a970ae38ce">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1673848728</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">d807d900-9562-11ed-94b8-8539433cb390</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/d/d80c1280-17ea-11ee-98ae-3df0911cfade.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="62d22051-0637-11ee-9d16-b90ac473a2f2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.74.60</data>
43
+ <data key="n_hostname">100.64.74.60</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-13083" target="HOST-15227">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688200791</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d80c1280-17ea-11ee-98ae-3df0911cfade</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d80c1e10-d3dd-11ee-a6e5-2b3ad02f17a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="df478993-0628-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.5.152</data>
35
+ <data key="n_hostname">100.64.5.152</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9554-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.11.166</data>
43
+ <data key="n_hostname">172.31.11.166</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="df478993-0628-11ee-b19f-ed665a42340f" target="HOST-2711">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708866026</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d80c1e10-d3dd-11ee-a6e5-2b3ad02f17a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d8125d30-5308-11ee-b63c-1beb4899e6f1.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9d21e701-4cf4-11ee-b9a7-833f73473c68">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.69.203</data>
35
+ <data key="n_hostname">100.64.69.203</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="05bd4232-0625-11ee-a453-0d8a3e9045c4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.29</data>
43
+ <data key="n_hostname">100.64.68.29</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect"]</data>
47
+ </node>
48
+ <edge id="e1" source="9d21e701-4cf4-11ee-b9a7-833f73473c68" target="HOST-11402">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694700794</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d8125d30-5308-11ee-b63c-1beb4899e6f1</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d8143e30-2111-11ee-bca7-0d1d0c9aa4ab.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f4-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.135.251.191</data>
35
+ <data key="n_hostname">10.135.251.191</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a2c58762-07ea-11ee-9aab-47a3979078e7">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.48.146</data>
43
+ <data key="n_hostname">100.64.48.146</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2751" target="HOST-8501">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689207101</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d8143e30-2111-11ee-bca7-0d1d0c9aa4ab</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d814bd40-fb1b-11ed-895b-69b7bcd870e2.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a1bc2080-d29e-11ed-a639-f1969fd2eb42">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.51.102</data>
35
+ <data key="n_hostname">100.64.51.102</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="3ef83d62-c823-11ed-a57f-1bec2f3cbc08">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.200.243</data>
43
+ <data key="n_hostname">172.30.200.243</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="a1bc2080-d29e-11ed-a639-f1969fd2eb42" target="HOST-3572">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1685033252</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d814bd40-fb1b-11ed-895b-69b7bcd870e2</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d8161b80-a4a5-11ed-b478-67badd244434.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="0ae07551-a119-11ed-b9bf-97fd60de49a8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.82.154</data>
35
+ <data key="n_hostname">100.64.82.154</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="9405cae1-9d9c-11ed-8ca6-bfaecb56e6a3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.119</data>
43
+ <data key="n_hostname">100.64.71.119</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="0ae07551-a119-11ed-b9bf-97fd60de49a8" target="HOST-14575">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1675526772</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d8161b80-a4a5-11ed-b478-67badd244434</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-14575" target="0ae07551-a119-11ed-b9bf-97fd60de49a8">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1675526772</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">d8161b80-a4a5-11ed-b478-67badd244434</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/d/d81c0f90-f058-11ee-abdc-892822517928.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="85496380-0625-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.8.49</data>
35
+ <data key="n_hostname">100.64.8.49</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.22.127.96</data>
43
+ <data key="n_hostname">172.22.127.96</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2857" target="HOST-2726">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1711997486</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d81c0f90-f058-11ee-abdc-892822517928</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d81df860-d3dd-11ee-a6e5-2b3ad02f17a7.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b9554-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.11.166</data>
35
+ <data key="n_hostname">172.31.11.166</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="df478993-0628-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.5.152</data>
43
+ <data key="n_hostname">100.64.5.152</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2711" target="HOST-7292">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708866026</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d81df860-d3dd-11ee-a6e5-2b3ad02f17a7</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d822a7a0-fe97-11ed-a08d-35e4f0a9a870.graphml ADDED
@@ -0,0 +1,789 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="02d4db43-c84b-11ed-8c35-972700107d72">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.21.238</data>
35
+ <data key="n_hostname">100.64.21.238</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="3ef8d9a1-c823-11ed-a57f-1bec2f3cbc08">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.174.172</data>
43
+ <data key="n_hostname">172.30.174.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
47
+ </node>
48
+ <node id="bd5f7860-d284-11ed-9805-3bcd73a8e235">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.46.2</data>
51
+ <data key="n_hostname">100.64.46.2</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="87837b82-e006-11ed-a5d2-39633d04d0e2">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.7.43</data>
59
+ <data key="n_hostname">100.64.7.43</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="d7a476f2-fe97-11ed-9a45-bb148b14dcf2">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.46.3</data>
67
+ <data key="n_hostname">100.64.46.3</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="dabd3676-c822-11ed-a57f-1bec2f3cbc08">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">172.29.40.149</data>
75
+ <data key="n_hostname">172.29.40.149</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.841796875</data>
78
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
79
+ </node>
80
+ <node id="2e576cf0-faa6-11ed-a14c-37cb091894cc">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.46.4</data>
83
+ <data key="n_hostname">100.64.46.4</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.7890625</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="e014b834-faf1-11ed-a5f5-85e121e6a1c9">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.18.167</data>
91
+ <data key="n_hostname">100.64.18.167</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.578125</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="f1aff660-c83b-11ed-abd7-5f4d648f7e01">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.9.120</data>
99
+ <data key="n_hostname">100.64.9.120</data>
100
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.71875</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <node id="15723394-dff9-11ed-bfae-df17ebd73e76">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.46.5</data>
107
+ <data key="n_hostname">100.64.46.5</data>
108
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.71875</data>
110
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
111
+ </node>
112
+ <node id="efa301c1-f9f3-11ed-9a95-61938be57dd3">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.46.6</data>
115
+ <data key="n_hostname">100.64.46.6</data>
116
+ <data key="n_set_roles">["Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.578125</data>
118
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
119
+ </node>
120
+ <node id="b64d0ea1-c822-11ed-93e7-73b4f1774f3f">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">172.31.6.172</data>
123
+ <data key="n_hostname">172.31.6.172</data>
124
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.841796875</data>
126
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
127
+ </node>
128
+ <node id="35658ba2-c999-11ed-826b-5319d01d7804">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.8.112</data>
131
+ <data key="n_hostname">100.64.8.112</data>
132
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.71875</data>
134
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
135
+ </node>
136
+ <node id="61136b80-c88d-11ed-9c0c-efe97a93b907">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.27.191</data>
139
+ <data key="n_hostname">100.64.27.191</data>
140
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
141
+ <data key="n_suspicion_score">0.71875</data>
142
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
143
+ </node>
144
+ <node id="f0c93e40-fbe0-11ed-b41d-3f073a698cd0">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.46.7</data>
147
+ <data key="n_hostname">100.64.46.7</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.578125</data>
150
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
151
+ </node>
152
+ <node id="60267fa2-d463-11ed-a4a9-7f13a8381b20">
153
+ <data key="n_type">HOST</data>
154
+ <data key="n_ip">100.64.8.28</data>
155
+ <data key="n_hostname">100.64.8.28</data>
156
+ <data key="n_set_roles">["Exploiting Host"]</data>
157
+ <data key="n_suspicion_score">0.4375</data>
158
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
159
+ </node>
160
+ <node id="b42a2081-e03d-11ed-89ca-cd42b52367cc">
161
+ <data key="n_type">HOST</data>
162
+ <data key="n_ip">100.64.46.8</data>
163
+ <data key="n_hostname">100.64.46.8</data>
164
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
165
+ <data key="n_suspicion_score">0.71875</data>
166
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
167
+ </node>
168
+ <node id="ad4c8e00-fe8e-11ed-bc14-b3a695747677">
169
+ <data key="n_type">HOST</data>
170
+ <data key="n_ip">100.64.46.9</data>
171
+ <data key="n_hostname">100.64.46.9</data>
172
+ <data key="n_set_roles">["Exploiting Host"]</data>
173
+ <data key="n_suspicion_score">0.578125</data>
174
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
175
+ </node>
176
+ <node id="c75df486-c86c-11ed-b634-5f1be824a23c">
177
+ <data key="n_type">HOST</data>
178
+ <data key="n_ip">100.64.12.47</data>
179
+ <data key="n_hostname">100.64.12.47</data>
180
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
181
+ <data key="n_suspicion_score">0.7890625</data>
182
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
183
+ </node>
184
+ <node id="e76a58b0-da62-11ed-9b80-e3abc809d505">
185
+ <data key="n_type">HOST</data>
186
+ <data key="n_ip">100.64.46.10</data>
187
+ <data key="n_hostname">100.64.46.10</data>
188
+ <data key="n_set_roles">["Exploiting Host"]</data>
189
+ <data key="n_suspicion_score">0.578125</data>
190
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
191
+ </node>
192
+ <node id="b0009340-f924-11ed-be03-656dd1f7bb5f">
193
+ <data key="n_type">HOST</data>
194
+ <data key="n_ip">100.64.46.11</data>
195
+ <data key="n_hostname">100.64.46.11</data>
196
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
197
+ <data key="n_suspicion_score">0.7890625</data>
198
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
199
+ </node>
200
+ <edge id="e1" source="02d4db43-c84b-11ed-8c35-972700107d72" target="HOST-2975">
201
+ <data key="e_type">INCIDENT_LINK</data>
202
+ <data key="e_timestamp">1685416363</data>
203
+ <data key="e_label_binary">malicious</data>
204
+ <data key="e_label_confidence">0.841796875</data>
205
+ <data key="e_suspicion_score">0.841796875</data>
206
+ <data key="e_mo_name">Data Theft</data>
207
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
208
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
209
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
210
+ <data key="e_lifecycle_stage">complete-mission</data>
211
+ <data key="e_disposition">Disrupted</data>
212
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
213
+ </edge>
214
+ <edge id="e2" source="HOST-2975" target="02d4db43-c84b-11ed-8c35-972700107d72">
215
+ <data key="e_type">INCIDENT_LINK</data>
216
+ <data key="e_timestamp">1685416363</data>
217
+ <data key="e_label_binary">malicious</data>
218
+ <data key="e_label_confidence">0.841796875</data>
219
+ <data key="e_suspicion_score">0.841796875</data>
220
+ <data key="e_mo_name">Data Theft</data>
221
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
222
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
223
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
224
+ <data key="e_lifecycle_stage">complete-mission</data>
225
+ <data key="e_disposition">Disrupted</data>
226
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
227
+ </edge>
228
+ <edge id="e3" source="bd5f7860-d284-11ed-9805-3bcd73a8e235" target="HOST-2975">
229
+ <data key="e_type">INCIDENT_LINK</data>
230
+ <data key="e_timestamp">1685416363</data>
231
+ <data key="e_label_binary">malicious</data>
232
+ <data key="e_label_confidence">0.841796875</data>
233
+ <data key="e_suspicion_score">0.841796875</data>
234
+ <data key="e_mo_name">Data Theft</data>
235
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
236
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
237
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
238
+ <data key="e_lifecycle_stage">complete-mission</data>
239
+ <data key="e_disposition">Disrupted</data>
240
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
241
+ </edge>
242
+ <edge id="e4" source="HOST-2975" target="bd5f7860-d284-11ed-9805-3bcd73a8e235">
243
+ <data key="e_type">INCIDENT_LINK</data>
244
+ <data key="e_timestamp">1685416363</data>
245
+ <data key="e_label_binary">malicious</data>
246
+ <data key="e_label_confidence">0.841796875</data>
247
+ <data key="e_suspicion_score">0.841796875</data>
248
+ <data key="e_mo_name">Data Theft</data>
249
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
250
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
251
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
252
+ <data key="e_lifecycle_stage">complete-mission</data>
253
+ <data key="e_disposition">Disrupted</data>
254
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
255
+ </edge>
256
+ <edge id="e5" source="87837b82-e006-11ed-a5d2-39633d04d0e2" target="HOST-2975">
257
+ <data key="e_type">INCIDENT_LINK</data>
258
+ <data key="e_timestamp">1685416363</data>
259
+ <data key="e_label_binary">malicious</data>
260
+ <data key="e_label_confidence">0.841796875</data>
261
+ <data key="e_suspicion_score">0.841796875</data>
262
+ <data key="e_mo_name">Data Theft</data>
263
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
264
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
265
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
266
+ <data key="e_lifecycle_stage">complete-mission</data>
267
+ <data key="e_disposition">Disrupted</data>
268
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
269
+ </edge>
270
+ <edge id="e6" source="HOST-2975" target="87837b82-e006-11ed-a5d2-39633d04d0e2">
271
+ <data key="e_type">INCIDENT_LINK</data>
272
+ <data key="e_timestamp">1685416363</data>
273
+ <data key="e_label_binary">malicious</data>
274
+ <data key="e_label_confidence">0.841796875</data>
275
+ <data key="e_suspicion_score">0.841796875</data>
276
+ <data key="e_mo_name">Data Theft</data>
277
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
278
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
279
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
280
+ <data key="e_lifecycle_stage">complete-mission</data>
281
+ <data key="e_disposition">Disrupted</data>
282
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
283
+ </edge>
284
+ <edge id="e7" source="d7a476f2-fe97-11ed-9a45-bb148b14dcf2" target="HOST-2968">
285
+ <data key="e_type">INCIDENT_LINK</data>
286
+ <data key="e_timestamp">1685416363</data>
287
+ <data key="e_label_binary">malicious</data>
288
+ <data key="e_label_confidence">0.841796875</data>
289
+ <data key="e_suspicion_score">0.841796875</data>
290
+ <data key="e_mo_name">Data Theft</data>
291
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
292
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
293
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
294
+ <data key="e_lifecycle_stage">complete-mission</data>
295
+ <data key="e_disposition">Disrupted</data>
296
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
297
+ </edge>
298
+ <edge id="e8" source="HOST-2968" target="d7a476f2-fe97-11ed-9a45-bb148b14dcf2">
299
+ <data key="e_type">INCIDENT_LINK</data>
300
+ <data key="e_timestamp">1685416363</data>
301
+ <data key="e_label_binary">malicious</data>
302
+ <data key="e_label_confidence">0.841796875</data>
303
+ <data key="e_suspicion_score">0.841796875</data>
304
+ <data key="e_mo_name">Data Theft</data>
305
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
306
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
307
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
308
+ <data key="e_lifecycle_stage">complete-mission</data>
309
+ <data key="e_disposition">Disrupted</data>
310
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
311
+ </edge>
312
+ <edge id="e9" source="HOST-2968" target="2e576cf0-faa6-11ed-a14c-37cb091894cc">
313
+ <data key="e_type">INCIDENT_LINK</data>
314
+ <data key="e_timestamp">1685416363</data>
315
+ <data key="e_label_binary">malicious</data>
316
+ <data key="e_label_confidence">0.841796875</data>
317
+ <data key="e_suspicion_score">0.841796875</data>
318
+ <data key="e_mo_name">Data Theft</data>
319
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
320
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
321
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
322
+ <data key="e_lifecycle_stage">complete-mission</data>
323
+ <data key="e_disposition">Disrupted</data>
324
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
325
+ </edge>
326
+ <edge id="e10" source="2e576cf0-faa6-11ed-a14c-37cb091894cc" target="HOST-2968">
327
+ <data key="e_type">INCIDENT_LINK</data>
328
+ <data key="e_timestamp">1685416363</data>
329
+ <data key="e_label_binary">malicious</data>
330
+ <data key="e_label_confidence">0.841796875</data>
331
+ <data key="e_suspicion_score">0.841796875</data>
332
+ <data key="e_mo_name">Data Theft</data>
333
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
334
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
335
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
336
+ <data key="e_lifecycle_stage">complete-mission</data>
337
+ <data key="e_disposition">Disrupted</data>
338
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
339
+ </edge>
340
+ <edge id="e11" source="bd5f7860-d284-11ed-9805-3bcd73a8e235" target="HOST-2968">
341
+ <data key="e_type">INCIDENT_LINK</data>
342
+ <data key="e_timestamp">1685416363</data>
343
+ <data key="e_label_binary">malicious</data>
344
+ <data key="e_label_confidence">0.841796875</data>
345
+ <data key="e_suspicion_score">0.841796875</data>
346
+ <data key="e_mo_name">Data Theft</data>
347
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
348
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
349
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
350
+ <data key="e_lifecycle_stage">complete-mission</data>
351
+ <data key="e_disposition">Disrupted</data>
352
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
353
+ </edge>
354
+ <edge id="e12" source="HOST-2968" target="bd5f7860-d284-11ed-9805-3bcd73a8e235">
355
+ <data key="e_type">INCIDENT_LINK</data>
356
+ <data key="e_timestamp">1685416363</data>
357
+ <data key="e_label_binary">malicious</data>
358
+ <data key="e_label_confidence">0.841796875</data>
359
+ <data key="e_suspicion_score">0.841796875</data>
360
+ <data key="e_mo_name">Data Theft</data>
361
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
362
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
363
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
364
+ <data key="e_lifecycle_stage">complete-mission</data>
365
+ <data key="e_disposition">Disrupted</data>
366
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
367
+ </edge>
368
+ <edge id="e13" source="e014b834-faf1-11ed-a5f5-85e121e6a1c9" target="HOST-2975">
369
+ <data key="e_type">INCIDENT_LINK</data>
370
+ <data key="e_timestamp">1685416363</data>
371
+ <data key="e_label_binary">malicious</data>
372
+ <data key="e_label_confidence">0.841796875</data>
373
+ <data key="e_suspicion_score">0.841796875</data>
374
+ <data key="e_mo_name">Data Theft</data>
375
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
376
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
377
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
378
+ <data key="e_lifecycle_stage">complete-mission</data>
379
+ <data key="e_disposition">Disrupted</data>
380
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
381
+ </edge>
382
+ <edge id="e14" source="HOST-2975" target="e014b834-faf1-11ed-a5f5-85e121e6a1c9">
383
+ <data key="e_type">INCIDENT_LINK</data>
384
+ <data key="e_timestamp">1685416363</data>
385
+ <data key="e_label_binary">malicious</data>
386
+ <data key="e_label_confidence">0.841796875</data>
387
+ <data key="e_suspicion_score">0.841796875</data>
388
+ <data key="e_mo_name">Data Theft</data>
389
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
390
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
391
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
392
+ <data key="e_lifecycle_stage">complete-mission</data>
393
+ <data key="e_disposition">Disrupted</data>
394
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
395
+ </edge>
396
+ <edge id="e15" source="f1aff660-c83b-11ed-abd7-5f4d648f7e01" target="HOST-2975">
397
+ <data key="e_type">INCIDENT_LINK</data>
398
+ <data key="e_timestamp">1685416363</data>
399
+ <data key="e_label_binary">malicious</data>
400
+ <data key="e_label_confidence">0.841796875</data>
401
+ <data key="e_suspicion_score">0.841796875</data>
402
+ <data key="e_mo_name">Data Theft</data>
403
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
404
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
405
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
406
+ <data key="e_lifecycle_stage">complete-mission</data>
407
+ <data key="e_disposition">Disrupted</data>
408
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
409
+ </edge>
410
+ <edge id="e16" source="HOST-2975" target="f1aff660-c83b-11ed-abd7-5f4d648f7e01">
411
+ <data key="e_type">INCIDENT_LINK</data>
412
+ <data key="e_timestamp">1685416363</data>
413
+ <data key="e_label_binary">malicious</data>
414
+ <data key="e_label_confidence">0.841796875</data>
415
+ <data key="e_suspicion_score">0.841796875</data>
416
+ <data key="e_mo_name">Data Theft</data>
417
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
418
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
419
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
420
+ <data key="e_lifecycle_stage">complete-mission</data>
421
+ <data key="e_disposition">Disrupted</data>
422
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
423
+ </edge>
424
+ <edge id="e17" source="15723394-dff9-11ed-bfae-df17ebd73e76" target="HOST-2975">
425
+ <data key="e_type">INCIDENT_LINK</data>
426
+ <data key="e_timestamp">1685416363</data>
427
+ <data key="e_label_binary">malicious</data>
428
+ <data key="e_label_confidence">0.841796875</data>
429
+ <data key="e_suspicion_score">0.841796875</data>
430
+ <data key="e_mo_name">Data Theft</data>
431
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
432
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
433
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
434
+ <data key="e_lifecycle_stage">complete-mission</data>
435
+ <data key="e_disposition">Disrupted</data>
436
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
437
+ </edge>
438
+ <edge id="e18" source="HOST-2975" target="15723394-dff9-11ed-bfae-df17ebd73e76">
439
+ <data key="e_type">INCIDENT_LINK</data>
440
+ <data key="e_timestamp">1685416363</data>
441
+ <data key="e_label_binary">malicious</data>
442
+ <data key="e_label_confidence">0.841796875</data>
443
+ <data key="e_suspicion_score">0.841796875</data>
444
+ <data key="e_mo_name">Data Theft</data>
445
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
446
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
447
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
448
+ <data key="e_lifecycle_stage">complete-mission</data>
449
+ <data key="e_disposition">Disrupted</data>
450
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
451
+ </edge>
452
+ <edge id="e19" source="efa301c1-f9f3-11ed-9a95-61938be57dd3" target="HOST-2975">
453
+ <data key="e_type">INCIDENT_LINK</data>
454
+ <data key="e_timestamp">1685416363</data>
455
+ <data key="e_label_binary">malicious</data>
456
+ <data key="e_label_confidence">0.841796875</data>
457
+ <data key="e_suspicion_score">0.841796875</data>
458
+ <data key="e_mo_name">Data Theft</data>
459
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
460
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
461
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
462
+ <data key="e_lifecycle_stage">complete-mission</data>
463
+ <data key="e_disposition">Disrupted</data>
464
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
465
+ </edge>
466
+ <edge id="e20" source="HOST-2975" target="efa301c1-f9f3-11ed-9a95-61938be57dd3">
467
+ <data key="e_type">INCIDENT_LINK</data>
468
+ <data key="e_timestamp">1685416363</data>
469
+ <data key="e_label_binary">malicious</data>
470
+ <data key="e_label_confidence">0.841796875</data>
471
+ <data key="e_suspicion_score">0.841796875</data>
472
+ <data key="e_mo_name">Data Theft</data>
473
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
474
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
475
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
476
+ <data key="e_lifecycle_stage">complete-mission</data>
477
+ <data key="e_disposition">Disrupted</data>
478
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
479
+ </edge>
480
+ <edge id="e21" source="HOST-3151" target="35658ba2-c999-11ed-826b-5319d01d7804">
481
+ <data key="e_type">INCIDENT_LINK</data>
482
+ <data key="e_timestamp">1685416363</data>
483
+ <data key="e_label_binary">malicious</data>
484
+ <data key="e_label_confidence">0.841796875</data>
485
+ <data key="e_suspicion_score">0.841796875</data>
486
+ <data key="e_mo_name">Data Theft</data>
487
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
488
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
489
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
490
+ <data key="e_lifecycle_stage">complete-mission</data>
491
+ <data key="e_disposition">Disrupted</data>
492
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
493
+ </edge>
494
+ <edge id="e22" source="35658ba2-c999-11ed-826b-5319d01d7804" target="HOST-3151">
495
+ <data key="e_type">INCIDENT_LINK</data>
496
+ <data key="e_timestamp">1685416363</data>
497
+ <data key="e_label_binary">malicious</data>
498
+ <data key="e_label_confidence">0.841796875</data>
499
+ <data key="e_suspicion_score">0.841796875</data>
500
+ <data key="e_mo_name">Data Theft</data>
501
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
502
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
503
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
504
+ <data key="e_lifecycle_stage">complete-mission</data>
505
+ <data key="e_disposition">Disrupted</data>
506
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
507
+ </edge>
508
+ <edge id="e23" source="HOST-6568" target="HOST-3151">
509
+ <data key="e_type">INCIDENT_LINK</data>
510
+ <data key="e_timestamp">1685416363</data>
511
+ <data key="e_label_binary">malicious</data>
512
+ <data key="e_label_confidence">0.841796875</data>
513
+ <data key="e_suspicion_score">0.841796875</data>
514
+ <data key="e_mo_name">Data Theft</data>
515
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
516
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
517
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
518
+ <data key="e_lifecycle_stage">complete-mission</data>
519
+ <data key="e_disposition">Disrupted</data>
520
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
521
+ </edge>
522
+ <edge id="e24" source="HOST-3151" target="HOST-6568">
523
+ <data key="e_type">INCIDENT_LINK</data>
524
+ <data key="e_timestamp">1685416363</data>
525
+ <data key="e_label_binary">malicious</data>
526
+ <data key="e_label_confidence">0.841796875</data>
527
+ <data key="e_suspicion_score">0.841796875</data>
528
+ <data key="e_mo_name">Data Theft</data>
529
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
530
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
531
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
532
+ <data key="e_lifecycle_stage">complete-mission</data>
533
+ <data key="e_disposition">Disrupted</data>
534
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
535
+ </edge>
536
+ <edge id="e25" source="f0c93e40-fbe0-11ed-b41d-3f073a698cd0" target="HOST-3151">
537
+ <data key="e_type">INCIDENT_LINK</data>
538
+ <data key="e_timestamp">1685416363</data>
539
+ <data key="e_label_binary">malicious</data>
540
+ <data key="e_label_confidence">0.841796875</data>
541
+ <data key="e_suspicion_score">0.841796875</data>
542
+ <data key="e_mo_name">Data Theft</data>
543
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
544
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
545
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
546
+ <data key="e_lifecycle_stage">complete-mission</data>
547
+ <data key="e_disposition">Disrupted</data>
548
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
549
+ </edge>
550
+ <edge id="e26" source="HOST-3151" target="f0c93e40-fbe0-11ed-b41d-3f073a698cd0">
551
+ <data key="e_type">INCIDENT_LINK</data>
552
+ <data key="e_timestamp">1685416363</data>
553
+ <data key="e_label_binary">malicious</data>
554
+ <data key="e_label_confidence">0.841796875</data>
555
+ <data key="e_suspicion_score">0.841796875</data>
556
+ <data key="e_mo_name">Data Theft</data>
557
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
558
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
559
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
560
+ <data key="e_lifecycle_stage">complete-mission</data>
561
+ <data key="e_disposition">Disrupted</data>
562
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
563
+ </edge>
564
+ <edge id="e27" source="60267fa2-d463-11ed-a4a9-7f13a8381b20" target="HOST-3151">
565
+ <data key="e_type">INCIDENT_LINK</data>
566
+ <data key="e_timestamp">1685416363</data>
567
+ <data key="e_label_binary">malicious</data>
568
+ <data key="e_label_confidence">0.841796875</data>
569
+ <data key="e_suspicion_score">0.841796875</data>
570
+ <data key="e_mo_name">Data Theft</data>
571
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
572
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
573
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
574
+ <data key="e_lifecycle_stage">complete-mission</data>
575
+ <data key="e_disposition">Disrupted</data>
576
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
577
+ </edge>
578
+ <edge id="e28" source="HOST-3151" target="60267fa2-d463-11ed-a4a9-7f13a8381b20">
579
+ <data key="e_type">INCIDENT_LINK</data>
580
+ <data key="e_timestamp">1685416363</data>
581
+ <data key="e_label_binary">malicious</data>
582
+ <data key="e_label_confidence">0.841796875</data>
583
+ <data key="e_suspicion_score">0.841796875</data>
584
+ <data key="e_mo_name">Data Theft</data>
585
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
586
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
587
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
588
+ <data key="e_lifecycle_stage">complete-mission</data>
589
+ <data key="e_disposition">Disrupted</data>
590
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
591
+ </edge>
592
+ <edge id="e29" source="b42a2081-e03d-11ed-89ca-cd42b52367cc" target="HOST-3151">
593
+ <data key="e_type">INCIDENT_LINK</data>
594
+ <data key="e_timestamp">1685416363</data>
595
+ <data key="e_label_binary">malicious</data>
596
+ <data key="e_label_confidence">0.841796875</data>
597
+ <data key="e_suspicion_score">0.841796875</data>
598
+ <data key="e_mo_name">Data Theft</data>
599
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
600
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
601
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
602
+ <data key="e_lifecycle_stage">complete-mission</data>
603
+ <data key="e_disposition">Disrupted</data>
604
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
605
+ </edge>
606
+ <edge id="e30" source="HOST-3151" target="b42a2081-e03d-11ed-89ca-cd42b52367cc">
607
+ <data key="e_type">INCIDENT_LINK</data>
608
+ <data key="e_timestamp">1685416363</data>
609
+ <data key="e_label_binary">malicious</data>
610
+ <data key="e_label_confidence">0.841796875</data>
611
+ <data key="e_suspicion_score">0.841796875</data>
612
+ <data key="e_mo_name">Data Theft</data>
613
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
614
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
615
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
616
+ <data key="e_lifecycle_stage">complete-mission</data>
617
+ <data key="e_disposition">Disrupted</data>
618
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
619
+ </edge>
620
+ <edge id="e31" source="ad4c8e00-fe8e-11ed-bc14-b3a695747677" target="HOST-3151">
621
+ <data key="e_type">INCIDENT_LINK</data>
622
+ <data key="e_timestamp">1685416363</data>
623
+ <data key="e_label_binary">malicious</data>
624
+ <data key="e_label_confidence">0.841796875</data>
625
+ <data key="e_suspicion_score">0.841796875</data>
626
+ <data key="e_mo_name">Data Theft</data>
627
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
628
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
629
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
630
+ <data key="e_lifecycle_stage">complete-mission</data>
631
+ <data key="e_disposition">Disrupted</data>
632
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
633
+ </edge>
634
+ <edge id="e32" source="HOST-3151" target="ad4c8e00-fe8e-11ed-bc14-b3a695747677">
635
+ <data key="e_type">INCIDENT_LINK</data>
636
+ <data key="e_timestamp">1685416363</data>
637
+ <data key="e_label_binary">malicious</data>
638
+ <data key="e_label_confidence">0.841796875</data>
639
+ <data key="e_suspicion_score">0.841796875</data>
640
+ <data key="e_mo_name">Data Theft</data>
641
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
642
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
643
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
644
+ <data key="e_lifecycle_stage">complete-mission</data>
645
+ <data key="e_disposition">Disrupted</data>
646
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
647
+ </edge>
648
+ <edge id="e33" source="c75df486-c86c-11ed-b634-5f1be824a23c" target="HOST-3151">
649
+ <data key="e_type">INCIDENT_LINK</data>
650
+ <data key="e_timestamp">1685416363</data>
651
+ <data key="e_label_binary">malicious</data>
652
+ <data key="e_label_confidence">0.841796875</data>
653
+ <data key="e_suspicion_score">0.841796875</data>
654
+ <data key="e_mo_name">Data Theft</data>
655
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
656
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
657
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
658
+ <data key="e_lifecycle_stage">complete-mission</data>
659
+ <data key="e_disposition">Disrupted</data>
660
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
661
+ </edge>
662
+ <edge id="e34" source="HOST-3151" target="c75df486-c86c-11ed-b634-5f1be824a23c">
663
+ <data key="e_type">INCIDENT_LINK</data>
664
+ <data key="e_timestamp">1685416363</data>
665
+ <data key="e_label_binary">malicious</data>
666
+ <data key="e_label_confidence">0.841796875</data>
667
+ <data key="e_suspicion_score">0.841796875</data>
668
+ <data key="e_mo_name">Data Theft</data>
669
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
670
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
671
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
672
+ <data key="e_lifecycle_stage">complete-mission</data>
673
+ <data key="e_disposition">Disrupted</data>
674
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
675
+ </edge>
676
+ <edge id="e35" source="e76a58b0-da62-11ed-9b80-e3abc809d505" target="HOST-3151">
677
+ <data key="e_type">INCIDENT_LINK</data>
678
+ <data key="e_timestamp">1685416363</data>
679
+ <data key="e_label_binary">malicious</data>
680
+ <data key="e_label_confidence">0.841796875</data>
681
+ <data key="e_suspicion_score">0.841796875</data>
682
+ <data key="e_mo_name">Data Theft</data>
683
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
684
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
685
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
686
+ <data key="e_lifecycle_stage">complete-mission</data>
687
+ <data key="e_disposition">Disrupted</data>
688
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
689
+ </edge>
690
+ <edge id="e36" source="HOST-3151" target="e76a58b0-da62-11ed-9b80-e3abc809d505">
691
+ <data key="e_type">INCIDENT_LINK</data>
692
+ <data key="e_timestamp">1685416363</data>
693
+ <data key="e_label_binary">malicious</data>
694
+ <data key="e_label_confidence">0.841796875</data>
695
+ <data key="e_suspicion_score">0.841796875</data>
696
+ <data key="e_mo_name">Data Theft</data>
697
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
698
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
699
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
700
+ <data key="e_lifecycle_stage">complete-mission</data>
701
+ <data key="e_disposition">Disrupted</data>
702
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
703
+ </edge>
704
+ <edge id="e37" source="HOST-2975" target="35658ba2-c999-11ed-826b-5319d01d7804">
705
+ <data key="e_type">INCIDENT_LINK</data>
706
+ <data key="e_timestamp">1685416363</data>
707
+ <data key="e_label_binary">malicious</data>
708
+ <data key="e_label_confidence">0.841796875</data>
709
+ <data key="e_suspicion_score">0.841796875</data>
710
+ <data key="e_mo_name">Data Theft</data>
711
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
712
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
713
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
714
+ <data key="e_lifecycle_stage">complete-mission</data>
715
+ <data key="e_disposition">Disrupted</data>
716
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
717
+ </edge>
718
+ <edge id="e38" source="35658ba2-c999-11ed-826b-5319d01d7804" target="HOST-2975">
719
+ <data key="e_type">INCIDENT_LINK</data>
720
+ <data key="e_timestamp">1685416363</data>
721
+ <data key="e_label_binary">malicious</data>
722
+ <data key="e_label_confidence">0.841796875</data>
723
+ <data key="e_suspicion_score">0.841796875</data>
724
+ <data key="e_mo_name">Data Theft</data>
725
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
726
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
727
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
728
+ <data key="e_lifecycle_stage">complete-mission</data>
729
+ <data key="e_disposition">Disrupted</data>
730
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
731
+ </edge>
732
+ <edge id="e39" source="b0009340-f924-11ed-be03-656dd1f7bb5f" target="HOST-2968">
733
+ <data key="e_type">INCIDENT_LINK</data>
734
+ <data key="e_timestamp">1685416363</data>
735
+ <data key="e_label_binary">malicious</data>
736
+ <data key="e_label_confidence">0.841796875</data>
737
+ <data key="e_suspicion_score">0.841796875</data>
738
+ <data key="e_mo_name">Data Theft</data>
739
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
740
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
741
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
742
+ <data key="e_lifecycle_stage">complete-mission</data>
743
+ <data key="e_disposition">Disrupted</data>
744
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
745
+ </edge>
746
+ <edge id="e40" source="HOST-2968" target="b0009340-f924-11ed-be03-656dd1f7bb5f">
747
+ <data key="e_type">INCIDENT_LINK</data>
748
+ <data key="e_timestamp">1685416363</data>
749
+ <data key="e_label_binary">malicious</data>
750
+ <data key="e_label_confidence">0.841796875</data>
751
+ <data key="e_suspicion_score">0.841796875</data>
752
+ <data key="e_mo_name">Data Theft</data>
753
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
754
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
755
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
756
+ <data key="e_lifecycle_stage">complete-mission</data>
757
+ <data key="e_disposition">Disrupted</data>
758
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
759
+ </edge>
760
+ <edge id="e41" source="ad4c8e00-fe8e-11ed-bc14-b3a695747677" target="HOST-2968">
761
+ <data key="e_type">INCIDENT_LINK</data>
762
+ <data key="e_timestamp">1685416363</data>
763
+ <data key="e_label_binary">malicious</data>
764
+ <data key="e_label_confidence">0.841796875</data>
765
+ <data key="e_suspicion_score">0.841796875</data>
766
+ <data key="e_mo_name">Data Theft</data>
767
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
768
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
769
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
770
+ <data key="e_lifecycle_stage">complete-mission</data>
771
+ <data key="e_disposition">Disrupted</data>
772
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
773
+ </edge>
774
+ <edge id="e42" source="HOST-2968" target="ad4c8e00-fe8e-11ed-bc14-b3a695747677">
775
+ <data key="e_type">INCIDENT_LINK</data>
776
+ <data key="e_timestamp">1685416363</data>
777
+ <data key="e_label_binary">malicious</data>
778
+ <data key="e_label_confidence">0.841796875</data>
779
+ <data key="e_suspicion_score">0.841796875</data>
780
+ <data key="e_mo_name">Data Theft</data>
781
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
782
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
783
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
784
+ <data key="e_lifecycle_stage">complete-mission</data>
785
+ <data key="e_disposition">Disrupted</data>
786
+ <data key="e_incident_id">d822a7a0-fe97-11ed-a08d-35e4f0a9a870</data>
787
+ </edge>
788
+ </graph>
789
+ </graphml>
graph/incidents_graphml/d/d8231470-6ef3-11ee-ab20-4f1e630cbb02.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="652ff400-4320-11ee-b094-8b28fc1d7057">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.27.217</data>
35
+ <data key="n_hostname">100.64.27.217</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.18.38.152</data>
43
+ <data key="n_hostname">172.18.38.152</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="652ff400-4320-11ee-b094-8b28fc1d7057" target="HOST-2844">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697770407</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d8231470-6ef3-11ee-ab20-4f1e630cbb02</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d8269f60-17ea-11ee-98ae-3df0911cfade.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1a992681-0632-11ee-9d60-e7b9fbc351b9">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.74.194</data>
35
+ <data key="n_hostname">100.64.74.194</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="1a992681-0632-11ee-9d60-e7b9fbc351b9" target="HOST-13083">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688200791</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d8269f60-17ea-11ee-98ae-3df0911cfade</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d82ca830-2111-11ee-bca7-0d1d0c9aa4ab.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a2c58762-07ea-11ee-9aab-47a3979078e7">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.48.146</data>
35
+ <data key="n_hostname">100.64.48.146</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.168.229</data>
43
+ <data key="n_hostname">172.23.168.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-8501" target="HOST-2865">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689207102</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d82ca830-2111-11ee-bca7-0d1d0c9aa4ab</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d82de9e0-f058-11ee-abdc-892822517928.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b2f34224-0624-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.22.127.96</data>
35
+ <data key="n_hostname">172.22.127.96</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="85496380-0625-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.49</data>
43
+ <data key="n_hostname">100.64.8.49</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2726" target="HOST-2857">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1711997487</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d82de9e0-f058-11ee-abdc-892822517928</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d82e96f0-29b7-11ee-b86f-6b6c9ebf54e6.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="faf70280-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.19.171</data>
35
+ <data key="n_hostname">100.64.19.171</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.9634375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f0075e5-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.18.96.192</data>
43
+ <data key="n_hostname">172.18.96.192</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4427" target="HOST-2715">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690158007</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.9634375</data>
53
+ <data key="e_suspicion_score">0.9634375</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d82e96f0-29b7-11ee-b86f-6b6c9ebf54e6</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d8317630-0bf4-11ee-9b02-ffb3de173f5d.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="15425ad0-0a47-11ee-a52e-e1d30a03a4ae">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.80.203</data>
35
+ <data key="n_hostname">100.64.80.203</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="765b8741-0634-11ee-a150-c9b826c4d475">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.76.254</data>
43
+ <data key="n_hostname">100.64.76.254</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="15425ad0-0a47-11ee-a52e-e1d30a03a4ae" target="HOST-14316">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686885672</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d8317630-0bf4-11ee-9b02-ffb3de173f5d</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-14316" target="15425ad0-0a47-11ee-a52e-e1d30a03a4ae">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1686885672</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">d8317630-0bf4-11ee-9b02-ffb3de173f5d</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/d/d8320890-6ef3-11ee-ab20-4f1e630cbb02.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.18.38.152</data>
35
+ <data key="n_hostname">172.18.38.152</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="652ff400-4320-11ee-b094-8b28fc1d7057">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.27.217</data>
43
+ <data key="n_hostname">100.64.27.217</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2844" target="HOST-5561">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1697770407</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d8320890-6ef3-11ee-ab20-4f1e630cbb02</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d8401ad0-17ea-11ee-98ae-3df0911cfade.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="1a992681-0632-11ee-9d60-e7b9fbc351b9">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.74.194</data>
43
+ <data key="n_hostname">100.64.74.194</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-13083" target="HOST-15228">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688200791</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d8401ad0-17ea-11ee-98ae-3df0911cfade</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d8476f30-0bf4-11ee-9b02-ffb3de173f5d.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4a33edf1-0658-11ee-9141-cb50aeeb2793">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.7.203</data>
35
+ <data key="n_hostname">100.64.7.203</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="fcadfc21-0638-11ee-8434-e720bc5c09e1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.253</data>
43
+ <data key="n_hostname">100.64.70.253</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="4a33edf1-0658-11ee-9141-cb50aeeb2793" target="fcadfc21-0638-11ee-8434-e720bc5c09e1">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686885672</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d8476f30-0bf4-11ee-9b02-ffb3de173f5d</data>
61
+ </edge>
62
+ <edge id="e2" source="fcadfc21-0638-11ee-8434-e720bc5c09e1" target="4a33edf1-0658-11ee-9141-cb50aeeb2793">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1686885672</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7890625</data>
67
+ <data key="e_suspicion_score">0.7890625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">d8476f30-0bf4-11ee-9b02-ffb3de173f5d</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/d/d84e2490-17ea-11ee-98ae-3df0911cfade.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a23a66b0-062f-11ee-9ada-07a7b4e16baa">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.79.153</data>
35
+ <data key="n_hostname">100.64.79.153</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="5ab9bd31-0626-11ee-aab2-71eb81956b3c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="a23a66b0-062f-11ee-9ada-07a7b4e16baa" target="HOST-13083">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688200791</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d84e2490-17ea-11ee-98ae-3df0911cfade</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d8628870-efe8-11ec-a293-5b334d10f0f6.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ff6747f2-eb81-11ec-988c-a192e0d8ce11">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.81.187</data>
35
+ <data key="n_hostname">100.64.81.187</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="d856d6d1-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.170</data>
43
+ <data key="n_hostname">USER-0015-1679.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <node id="ffd476c0-eb83-11ec-b043-431461e9295d">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.81.188</data>
51
+ <data key="n_hostname">100.64.81.188</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="050d17e1-eba8-11ec-a8b6-c50a49500619">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.81.189</data>
59
+ <data key="n_hostname">100.64.81.189</data>
60
+ <data key="n_set_roles">["Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.4375</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <edge id="e1" source="ff6747f2-eb81-11ec-988c-a192e0d8ce11" target="HOST-13636">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1655654388</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.841796875</data>
69
+ <data key="e_suspicion_score">0.841796875</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">d8628870-efe8-11ec-a293-5b334d10f0f6</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-13636" target="ff6747f2-eb81-11ec-988c-a192e0d8ce11">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1655654388</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.841796875</data>
83
+ <data key="e_suspicion_score">0.841796875</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">d8628870-efe8-11ec-a293-5b334d10f0f6</data>
91
+ </edge>
92
+ <edge id="e3" source="HOST-13636" target="ffd476c0-eb83-11ec-b043-431461e9295d">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1655654388</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.841796875</data>
97
+ <data key="e_suspicion_score">0.841796875</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">d8628870-efe8-11ec-a293-5b334d10f0f6</data>
105
+ </edge>
106
+ <edge id="e4" source="ffd476c0-eb83-11ec-b043-431461e9295d" target="HOST-13636">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1655654388</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.841796875</data>
111
+ <data key="e_suspicion_score">0.841796875</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">d8628870-efe8-11ec-a293-5b334d10f0f6</data>
119
+ </edge>
120
+ <edge id="e5" source="HOST-13636" target="050d17e1-eba8-11ec-a8b6-c50a49500619">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1655654388</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.841796875</data>
125
+ <data key="e_suspicion_score">0.841796875</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">d8628870-efe8-11ec-a293-5b334d10f0f6</data>
133
+ </edge>
134
+ <edge id="e6" source="050d17e1-eba8-11ec-a8b6-c50a49500619" target="HOST-13636">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1655654388</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.841796875</data>
139
+ <data key="e_suspicion_score">0.841796875</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">d8628870-efe8-11ec-a293-5b334d10f0f6</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>
graph/incidents_graphml/d/d865c7c0-ab6c-11ed-b288-05f5e2790b36.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="949ac537-9e1b-11ed-bec8-1d4677034d75">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.88.94</data>
35
+ <data key="n_hostname">100.64.88.94</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f96c084-9d8d-11ed-8ff2-3593b92fed96">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.113.78.104</data>
43
+ <data key="n_hostname">10.113.78.104</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="949ac537-9e1b-11ed-bec8-1d4677034d75" target="HOST-16926">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1676271949</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d865c7c0-ab6c-11ed-b288-05f5e2790b36</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d865e9d0-f058-11ee-abdc-892822517928.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.18.38.152</data>
35
+ <data key="n_hostname">172.18.38.152</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="7fdf0770-2ee7-11ee-92f9-cdd7e95a915a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.27.190</data>
43
+ <data key="n_hostname">100.64.27.190</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2844" target="HOST-5547">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1711997487</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d865e9d0-f058-11ee-abdc-892822517928</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d86ad0d0-ab6c-11ed-b288-05f5e2790b36.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9f96c084-9d8d-11ed-8ff2-3593b92fed96">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.113.78.104</data>
35
+ <data key="n_hostname">10.113.78.104</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="949ac537-9e1b-11ed-bec8-1d4677034d75">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.88.94</data>
43
+ <data key="n_hostname">100.64.88.94</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16926" target="HOST-17531">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1676271949</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d86ad0d0-ab6c-11ed-b288-05f5e2790b36</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d874ddf0-f058-11ee-abdc-892822517928.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="fa682572-0625-11ee-b404-ff2ea490fc35">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.13.59</data>
35
+ <data key="n_hostname">100.64.13.59</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.217.8</data>
43
+ <data key="n_hostname">172.24.217.8</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="2f0075e5-0625-11ee-bea9-5f52a09eb73a">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.18.96.192</data>
51
+ <data key="n_hostname">172.18.96.192</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-3530" target="HOST-2731">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1711997487</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">d874ddf0-f058-11ee-abdc-892822517928</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-3530" target="HOST-2715">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1711997487</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">d874ddf0-f058-11ee-abdc-892822517928</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/d/d87af270-efe8-11ec-a293-5b334d10f0f6.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e9542928-ed56-11ec-9164-f760cfe6d247">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.81.193</data>
35
+ <data key="n_hostname">100.64.81.193</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="e04e7b40-ea91-11ec-abf7-619673fe2558">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.73.36</data>
43
+ <data key="n_hostname">100.64.73.36</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="e9542928-ed56-11ec-9164-f760cfe6d247" target="HOST-13350">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1655654388</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d87af270-efe8-11ec-a293-5b334d10f0f6</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13350" target="e9542928-ed56-11ec-9164-f760cfe6d247">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1655654388</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">d87af270-efe8-11ec-a293-5b334d10f0f6</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/d/d87c5b80-0010-11ef-83c1-e54678fd0000.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5245f614-f738-11ee-9903-adff4f861f38">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.69.170</data>
35
+ <data key="n_hostname">100.64.69.170</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="af00dcda-0625-11ee-872d-37355cbb58d3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.38</data>
43
+ <data key="n_hostname">100.64.68.38</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]</data>
47
+ </node>
48
+ <edge id="e1" source="5245f614-f738-11ee-9903-adff4f861f38" target="HOST-11397">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713725782</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d87c5b80-0010-11ef-83c1-e54678fd0000</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d87e5da0-0cb8-11ee-9777-83d870147fdf.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="36b45663-062c-11ee-a75f-ef84e9044642">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.26.73.92</data>
35
+ <data key="n_hostname">172.26.73.92</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="cb952830-082b-11ee-9160-913d5a13dd99">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.66.149</data>
43
+ <data key="n_hostname">USER-0015-1476.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2724" target="cb952830-082b-11ee-9160-913d5a13dd99">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686969854</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d87e5da0-0cb8-11ee-9777-83d870147fdf</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d87f68c0-0010-11ef-83c1-e54678fd0000.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="af00dcda-0625-11ee-872d-37355cbb58d3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.38</data>
35
+ <data key="n_hostname">100.64.68.38</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="5245f614-f738-11ee-9903-adff4f861f38">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.69.170</data>
43
+ <data key="n_hostname">100.64.69.170</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11397" target="HOST-12165">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713725782</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d87f68c0-0010-11ef-83c1-e54678fd0000</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d880ef60-0010-11ef-83c1-e54678fd0000.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="fecd0351-3a74-11ee-b72b-897e33dd254f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.12.136</data>
35
+ <data key="n_hostname">100.64.12.136</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="56cc99f4-0625-11ee-ae19-679f8bc2c45f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.28</data>
43
+ <data key="n_hostname">100.64.68.28</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Protect","CASB"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11460" target="HOST-11400">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713725782</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d880ef60-0010-11ef-83c1-e54678fd0000</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d8831240-0010-11ef-83c1-e54678fd0000.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="56cc99f4-0625-11ee-ae19-679f8bc2c45f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.28</data>
35
+ <data key="n_hostname">100.64.68.28</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","Protect","CASB"]</data>
39
+ </node>
40
+ <node id="fecd0351-3a74-11ee-b72b-897e33dd254f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.12.136</data>
43
+ <data key="n_hostname">100.64.12.136</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11400" target="HOST-11460">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713725782</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">d8831240-0010-11ef-83c1-e54678fd0000</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d8850a90-f058-11ee-abdc-892822517928.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.217.8</data>
35
+ <data key="n_hostname">172.24.217.8</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="fa682572-0625-11ee-b404-ff2ea490fc35">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.13.59</data>
43
+ <data key="n_hostname">100.64.13.59</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2731" target="HOST-3530">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1711997487</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">d8850a90-f058-11ee-abdc-892822517928</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/d/d8855c80-1e11-11ee-9177-87bbc2825325.graphml ADDED
@@ -0,0 +1,257 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="234c3431-0bef-11ee-9d0e-7dbccbbca7eb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.188</data>
35
+ <data key="n_hostname">100.64.18.188</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="8f2e6e20-0627-11ee-8b63-19546bc2fdf3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.91</data>
43
+ <data key="n_hostname">100.64.72.91</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="5e3e70f1-0643-11ee-8a1f-eb69b8331d5d">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.11.19</data>
51
+ <data key="n_hostname">100.64.11.19</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
55
+ </node>
56
+ <node id="994b53d0-0638-11ee-8434-e720bc5c09e1">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.25.238</data>
59
+ <data key="n_hostname">100.64.25.238</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="63e71350-17bd-11ee-aa6e-83735a73c55b">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.83.55</data>
67
+ <data key="n_hostname">100.64.83.55</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <node id="7ad3ee01-064a-11ee-a1c0-af40b19a49a7">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.36.166</data>
75
+ <data key="n_hostname">100.64.36.166</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","Meraki"]</data>
79
+ </node>
80
+ <node id="d92d64a2-065d-11ee-9141-cb50aeeb2793">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.21.148</data>
83
+ <data key="n_hostname">100.64.21.148</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","Meraki"]</data>
87
+ </node>
88
+ <edge id="e1" source="HOST-13057" target="HOST-12875">
89
+ <data key="e_type">INCIDENT_LINK</data>
90
+ <data key="e_timestamp">1688877249</data>
91
+ <data key="e_label_binary">malicious</data>
92
+ <data key="e_label_confidence">0.841796875</data>
93
+ <data key="e_suspicion_score">0.841796875</data>
94
+ <data key="e_mo_name">Data Theft</data>
95
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
96
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
97
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
98
+ <data key="e_lifecycle_stage">complete-mission</data>
99
+ <data key="e_disposition">Disrupted</data>
100
+ <data key="e_incident_id">d8855c80-1e11-11ee-9177-87bbc2825325</data>
101
+ </edge>
102
+ <edge id="e2" source="HOST-12875" target="HOST-13057">
103
+ <data key="e_type">INCIDENT_LINK</data>
104
+ <data key="e_timestamp">1688877249</data>
105
+ <data key="e_label_binary">malicious</data>
106
+ <data key="e_label_confidence">0.841796875</data>
107
+ <data key="e_suspicion_score">0.841796875</data>
108
+ <data key="e_mo_name">Data Theft</data>
109
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
110
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
111
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
112
+ <data key="e_lifecycle_stage">complete-mission</data>
113
+ <data key="e_disposition">Disrupted</data>
114
+ <data key="e_incident_id">d8855c80-1e11-11ee-9177-87bbc2825325</data>
115
+ </edge>
116
+ <edge id="e3" source="HOST-14280" target="HOST-12875">
117
+ <data key="e_type">INCIDENT_LINK</data>
118
+ <data key="e_timestamp">1688877249</data>
119
+ <data key="e_label_binary">malicious</data>
120
+ <data key="e_label_confidence">0.841796875</data>
121
+ <data key="e_suspicion_score">0.841796875</data>
122
+ <data key="e_mo_name">Data Theft</data>
123
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
124
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
125
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
126
+ <data key="e_lifecycle_stage">complete-mission</data>
127
+ <data key="e_disposition">Disrupted</data>
128
+ <data key="e_incident_id">d8855c80-1e11-11ee-9177-87bbc2825325</data>
129
+ </edge>
130
+ <edge id="e4" source="HOST-12875" target="HOST-14280">
131
+ <data key="e_type">INCIDENT_LINK</data>
132
+ <data key="e_timestamp">1688877249</data>
133
+ <data key="e_label_binary">malicious</data>
134
+ <data key="e_label_confidence">0.841796875</data>
135
+ <data key="e_suspicion_score">0.841796875</data>
136
+ <data key="e_mo_name">Data Theft</data>
137
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
138
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
139
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
140
+ <data key="e_lifecycle_stage">complete-mission</data>
141
+ <data key="e_disposition">Disrupted</data>
142
+ <data key="e_incident_id">d8855c80-1e11-11ee-9177-87bbc2825325</data>
143
+ </edge>
144
+ <edge id="e5" source="994b53d0-0638-11ee-8434-e720bc5c09e1" target="HOST-12875">
145
+ <data key="e_type">INCIDENT_LINK</data>
146
+ <data key="e_timestamp">1688877249</data>
147
+ <data key="e_label_binary">malicious</data>
148
+ <data key="e_label_confidence">0.841796875</data>
149
+ <data key="e_suspicion_score">0.841796875</data>
150
+ <data key="e_mo_name">Data Theft</data>
151
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
152
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
153
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
154
+ <data key="e_lifecycle_stage">complete-mission</data>
155
+ <data key="e_disposition">Disrupted</data>
156
+ <data key="e_incident_id">d8855c80-1e11-11ee-9177-87bbc2825325</data>
157
+ </edge>
158
+ <edge id="e6" source="HOST-12875" target="994b53d0-0638-11ee-8434-e720bc5c09e1">
159
+ <data key="e_type">INCIDENT_LINK</data>
160
+ <data key="e_timestamp">1688877249</data>
161
+ <data key="e_label_binary">malicious</data>
162
+ <data key="e_label_confidence">0.841796875</data>
163
+ <data key="e_suspicion_score">0.841796875</data>
164
+ <data key="e_mo_name">Data Theft</data>
165
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
166
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
167
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
168
+ <data key="e_lifecycle_stage">complete-mission</data>
169
+ <data key="e_disposition">Disrupted</data>
170
+ <data key="e_incident_id">d8855c80-1e11-11ee-9177-87bbc2825325</data>
171
+ </edge>
172
+ <edge id="e7" source="63e71350-17bd-11ee-aa6e-83735a73c55b" target="HOST-12875">
173
+ <data key="e_type">INCIDENT_LINK</data>
174
+ <data key="e_timestamp">1688877249</data>
175
+ <data key="e_label_binary">malicious</data>
176
+ <data key="e_label_confidence">0.841796875</data>
177
+ <data key="e_suspicion_score">0.841796875</data>
178
+ <data key="e_mo_name">Data Theft</data>
179
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
180
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
181
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
182
+ <data key="e_lifecycle_stage">complete-mission</data>
183
+ <data key="e_disposition">Disrupted</data>
184
+ <data key="e_incident_id">d8855c80-1e11-11ee-9177-87bbc2825325</data>
185
+ </edge>
186
+ <edge id="e8" source="HOST-12875" target="63e71350-17bd-11ee-aa6e-83735a73c55b">
187
+ <data key="e_type">INCIDENT_LINK</data>
188
+ <data key="e_timestamp">1688877249</data>
189
+ <data key="e_label_binary">malicious</data>
190
+ <data key="e_label_confidence">0.841796875</data>
191
+ <data key="e_suspicion_score">0.841796875</data>
192
+ <data key="e_mo_name">Data Theft</data>
193
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
194
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
195
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
196
+ <data key="e_lifecycle_stage">complete-mission</data>
197
+ <data key="e_disposition">Disrupted</data>
198
+ <data key="e_incident_id">d8855c80-1e11-11ee-9177-87bbc2825325</data>
199
+ </edge>
200
+ <edge id="e9" source="HOST-12997" target="HOST-12875">
201
+ <data key="e_type">INCIDENT_LINK</data>
202
+ <data key="e_timestamp">1688877249</data>
203
+ <data key="e_label_binary">malicious</data>
204
+ <data key="e_label_confidence">0.841796875</data>
205
+ <data key="e_suspicion_score">0.841796875</data>
206
+ <data key="e_mo_name">Data Theft</data>
207
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
208
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
209
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
210
+ <data key="e_lifecycle_stage">complete-mission</data>
211
+ <data key="e_disposition">Disrupted</data>
212
+ <data key="e_incident_id">d8855c80-1e11-11ee-9177-87bbc2825325</data>
213
+ </edge>
214
+ <edge id="e10" source="HOST-12875" target="HOST-12997">
215
+ <data key="e_type">INCIDENT_LINK</data>
216
+ <data key="e_timestamp">1688877249</data>
217
+ <data key="e_label_binary">malicious</data>
218
+ <data key="e_label_confidence">0.841796875</data>
219
+ <data key="e_suspicion_score">0.841796875</data>
220
+ <data key="e_mo_name">Data Theft</data>
221
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
222
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
223
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
224
+ <data key="e_lifecycle_stage">complete-mission</data>
225
+ <data key="e_disposition">Disrupted</data>
226
+ <data key="e_incident_id">d8855c80-1e11-11ee-9177-87bbc2825325</data>
227
+ </edge>
228
+ <edge id="e11" source="d92d64a2-065d-11ee-9141-cb50aeeb2793" target="HOST-12875">
229
+ <data key="e_type">INCIDENT_LINK</data>
230
+ <data key="e_timestamp">1688877249</data>
231
+ <data key="e_label_binary">malicious</data>
232
+ <data key="e_label_confidence">0.841796875</data>
233
+ <data key="e_suspicion_score">0.841796875</data>
234
+ <data key="e_mo_name">Data Theft</data>
235
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
236
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
237
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
238
+ <data key="e_lifecycle_stage">complete-mission</data>
239
+ <data key="e_disposition">Disrupted</data>
240
+ <data key="e_incident_id">d8855c80-1e11-11ee-9177-87bbc2825325</data>
241
+ </edge>
242
+ <edge id="e12" source="HOST-12875" target="d92d64a2-065d-11ee-9141-cb50aeeb2793">
243
+ <data key="e_type">INCIDENT_LINK</data>
244
+ <data key="e_timestamp">1688877249</data>
245
+ <data key="e_label_binary">malicious</data>
246
+ <data key="e_label_confidence">0.841796875</data>
247
+ <data key="e_suspicion_score">0.841796875</data>
248
+ <data key="e_mo_name">Data Theft</data>
249
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
250
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
251
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
252
+ <data key="e_lifecycle_stage">complete-mission</data>
253
+ <data key="e_disposition">Disrupted</data>
254
+ <data key="e_incident_id">d8855c80-1e11-11ee-9177-87bbc2825325</data>
255
+ </edge>
256
+ </graph>
257
+ </graphml>