diff --git a/graph/incidents_graphml/d/d7b3a7b0-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/d7b3a7b0-b752-11ed-808d-57d97cd084e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d2f6ee5cf290150a181444d7f82e98de8740021
--- /dev/null
+++ b/graph/incidents_graphml/d/d7b3a7b0-b752-11ed-808d-57d97cd084e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.136
+ 100.64.92.136
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677580195
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d7b3a7b0-b752-11ed-808d-57d97cd084e1
+
+
+
diff --git a/graph/incidents_graphml/d/d7b618b0-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/d7b618b0-b752-11ed-808d-57d97cd084e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2360c44cb0ee971c0849ba100af4c2ebb92030d5
--- /dev/null
+++ b/graph/incidents_graphml/d/d7b618b0-b752-11ed-808d-57d97cd084e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.77
+ 100.64.4.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677580195
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ d7b618b0-b752-11ed-808d-57d97cd084e1
+
+
+
diff --git a/graph/incidents_graphml/d/d7ba1050-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/d7ba1050-b752-11ed-808d-57d97cd084e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d00ae5f78a07335cf7ef7aadd713f8732c3ba510
--- /dev/null
+++ b/graph/incidents_graphml/d/d7ba1050-b752-11ed-808d-57d97cd084e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.77
+ 100.64.4.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677580195
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d7ba1050-b752-11ed-808d-57d97cd084e1
+
+
+
diff --git a/graph/incidents_graphml/d/d7ba4a50-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/d7ba4a50-0cb8-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2139c443713d2dc56edf617d2643da6c5d0264b6
--- /dev/null
+++ b/graph/incidents_graphml/d/d7ba4a50-0cb8-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.218
+ 100.64.23.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686969853
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d7ba4a50-0cb8-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/d/d7c03b40-0983-11ef-a068-8dbaaaaf6c28.graphml b/graph/incidents_graphml/d/d7c03b40-0983-11ef-a068-8dbaaaaf6c28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..afb2f71d5cea17276604bf68292b880c42d93538
--- /dev/null
+++ b/graph/incidents_graphml/d/d7c03b40-0983-11ef-a068-8dbaaaaf6c28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.127
+ 100.64.4.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714764733
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d7c03b40-0983-11ef-a068-8dbaaaaf6c28
+
+
+
diff --git a/graph/incidents_graphml/d/d7c35f20-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/d7c35f20-b752-11ed-808d-57d97cd084e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ffce4354de6f86bafbe601dcfb48272c42b24d9
--- /dev/null
+++ b/graph/incidents_graphml/d/d7c35f20-b752-11ed-808d-57d97cd084e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.138
+ 100.64.92.138
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677580195
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d7c35f20-b752-11ed-808d-57d97cd084e1
+
+
+
diff --git a/graph/incidents_graphml/d/d7c63050-dfa2-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/d/d7c63050-dfa2-11ee-9120-ff7b7094ac3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..611d2a2402697dee7e1c3aa8effb506e700b8bdc
--- /dev/null
+++ b/graph/incidents_graphml/d/d7c63050-dfa2-11ee-9120-ff7b7094ac3d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.152
+ 100.64.22.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1710160099
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d7c63050-dfa2-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710160099
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d7c63050-dfa2-11ee-9120-ff7b7094ac3d
+
+
+
diff --git a/graph/incidents_graphml/d/d7cdf810-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d7cdf810-17ea-11ee-98ae-3df0911cfade.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f4b5dcaef236e4c631bb3160e955321a5b06c1a
--- /dev/null
+++ b/graph/incidents_graphml/d/d7cdf810-17ea-11ee-98ae-3df0911cfade.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.27
+ 100.64.78.27
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688200790
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d7cdf810-17ea-11ee-98ae-3df0911cfade
+
+
+
diff --git a/graph/incidents_graphml/d/d7d05840-6bcc-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/d/d7d05840-6bcc-11ee-ac23-0990c4be3eac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f427240ead3e9bc93e1e5e3c0dea941de5ef3c9
--- /dev/null
+++ b/graph/incidents_graphml/d/d7d05840-6bcc-11ee-ac23-0990c4be3eac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.255
+ 100.64.54.255
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697423803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d7d05840-6bcc-11ee-ac23-0990c4be3eac
+
+
+
diff --git a/graph/incidents_graphml/d/d7dc9590-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d7dc9590-f058-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6cbff0988de5c13e8304471b343dad9cafc23020
--- /dev/null
+++ b/graph/incidents_graphml/d/d7dc9590-f058-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.22
+ USER-0015-1296.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711997486
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d7dc9590-f058-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/d/d7e02080-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d7e02080-17ea-11ee-98ae-3df0911cfade.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4b088abf6b691cc3b2636427e2a640fd3f490c1a
--- /dev/null
+++ b/graph/incidents_graphml/d/d7e02080-17ea-11ee-98ae-3df0911cfade.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.27
+ 100.64.78.27
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688200790
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d7e02080-17ea-11ee-98ae-3df0911cfade
+
+
+
diff --git a/graph/incidents_graphml/d/d7e19650-6bcc-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/d/d7e19650-6bcc-11ee-ac23-0990c4be3eac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cba04311a5ce63cfb5df9198de762d4fef75e67c
--- /dev/null
+++ b/graph/incidents_graphml/d/d7e19650-6bcc-11ee-ac23-0990c4be3eac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.255
+ 100.64.54.255
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697423803
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d7e19650-6bcc-11ee-ac23-0990c4be3eac
+
+
+
diff --git a/graph/incidents_graphml/d/d7eff680-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d7eff680-f058-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a137d5a42dbf5729630654ded21747e09f767256
--- /dev/null
+++ b/graph/incidents_graphml/d/d7eff680-f058-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.225
+ 100.64.35.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711997486
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d7eff680-f058-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/d/d7f41db0-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d7f41db0-17ea-11ee-98ae-3df0911cfade.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7218aba8ae6bc50f2ac05a235f3989a823fc3513
--- /dev/null
+++ b/graph/incidents_graphml/d/d7f41db0-17ea-11ee-98ae-3df0911cfade.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.60
+ 100.64.74.60
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688200790
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d7f41db0-17ea-11ee-98ae-3df0911cfade
+
+
+
diff --git a/graph/incidents_graphml/d/d7f54480-2111-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/d/d7f54480-2111-11ee-bca7-0d1d0c9aa4ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..475600fa423f625e108799b7b3538c8556b111ce
--- /dev/null
+++ b/graph/incidents_graphml/d/d7f54480-2111-11ee-bca7-0d1d0c9aa4ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.146
+ 100.64.48.146
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689207101
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d7f54480-2111-11ee-bca7-0d1d0c9aa4ab
+
+
+
diff --git a/graph/incidents_graphml/d/d7ff86e0-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d7ff86e0-f058-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c88396cae2e9926e53a2e9f5bd50884d4bbaa15f
--- /dev/null
+++ b/graph/incidents_graphml/d/d7ff86e0-f058-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.110
+ 100.64.8.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711997486
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d7ff86e0-f058-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/d/d80540f0-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/d80540f0-9562-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35b2a3d636107407297664115978f052061ea8a1
--- /dev/null
+++ b/graph/incidents_graphml/d/d80540f0-9562-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.34
+ 100.64.18.34
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.253
+ 100.64.70.253
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.76.246
+ 100.64.76.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1673848728
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d80540f0-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848728
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d80540f0-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848728
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d80540f0-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848728
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d80540f0-9562-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/d/d807d900-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/d807d900-9562-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..868362c4018e937ae839a4faba2fb90ff462dc4b
--- /dev/null
+++ b/graph/incidents_graphml/d/d807d900-9562-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.162
+ 100.64.78.162
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.170
+ 100.64.72.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.78.163
+ 100.64.78.163
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1673848728
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d807d900-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848728
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d807d900-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848728
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d807d900-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848728
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d807d900-9562-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/d/d80c1280-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d80c1280-17ea-11ee-98ae-3df0911cfade.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44de0b82abc54c63b1a1c4e8338808406fbf34f8
--- /dev/null
+++ b/graph/incidents_graphml/d/d80c1280-17ea-11ee-98ae-3df0911cfade.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.60
+ 100.64.74.60
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688200791
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d80c1280-17ea-11ee-98ae-3df0911cfade
+
+
+
diff --git a/graph/incidents_graphml/d/d80c1e10-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/d80c1e10-d3dd-11ee-a6e5-2b3ad02f17a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ddf7a0d6543bdd513533670b6cf64dd049a69ec8
--- /dev/null
+++ b/graph/incidents_graphml/d/d80c1e10-d3dd-11ee-a6e5-2b3ad02f17a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.152
+ 100.64.5.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708866026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d80c1e10-d3dd-11ee-a6e5-2b3ad02f17a7
+
+
+
diff --git a/graph/incidents_graphml/d/d8125d30-5308-11ee-b63c-1beb4899e6f1.graphml b/graph/incidents_graphml/d/d8125d30-5308-11ee-b63c-1beb4899e6f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94ce708bdbe905c4072251dd9ff5bad88b009666
--- /dev/null
+++ b/graph/incidents_graphml/d/d8125d30-5308-11ee-b63c-1beb4899e6f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.203
+ 100.64.69.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1694700794
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8125d30-5308-11ee-b63c-1beb4899e6f1
+
+
+
diff --git a/graph/incidents_graphml/d/d8143e30-2111-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/d/d8143e30-2111-11ee-bca7-0d1d0c9aa4ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7cf46067e454256e89ef36b44c39b33feb107865
--- /dev/null
+++ b/graph/incidents_graphml/d/d8143e30-2111-11ee-bca7-0d1d0c9aa4ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.146
+ 100.64.48.146
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689207101
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ d8143e30-2111-11ee-bca7-0d1d0c9aa4ab
+
+
+
diff --git a/graph/incidents_graphml/d/d814bd40-fb1b-11ed-895b-69b7bcd870e2.graphml b/graph/incidents_graphml/d/d814bd40-fb1b-11ed-895b-69b7bcd870e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d847574dfbacaf70e24d350fae8bdf3ceb8525b
--- /dev/null
+++ b/graph/incidents_graphml/d/d814bd40-fb1b-11ed-895b-69b7bcd870e2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.102
+ 100.64.51.102
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685033252
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d814bd40-fb1b-11ed-895b-69b7bcd870e2
+
+
+
diff --git a/graph/incidents_graphml/d/d8161b80-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/d/d8161b80-a4a5-11ed-b478-67badd244434.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef98145c540d19107ba5cfe0e2b47faec8d38b26
--- /dev/null
+++ b/graph/incidents_graphml/d/d8161b80-a4a5-11ed-b478-67badd244434.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.154
+ 100.64.82.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.119
+ 100.64.71.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1675526772
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8161b80-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526772
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8161b80-a4a5-11ed-b478-67badd244434
+
+
+
diff --git a/graph/incidents_graphml/d/d81c0f90-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d81c0f90-f058-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e5495e8d8f56497e83996b6028a6081c90e385e
--- /dev/null
+++ b/graph/incidents_graphml/d/d81c0f90-f058-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711997486
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d81c0f90-f058-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/d/d81df860-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/d81df860-d3dd-11ee-a6e5-2b3ad02f17a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66ebbee61f5d4e71944b0b674ef35bb922fbf04b
--- /dev/null
+++ b/graph/incidents_graphml/d/d81df860-d3dd-11ee-a6e5-2b3ad02f17a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.152
+ 100.64.5.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708866026
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d81df860-d3dd-11ee-a6e5-2b3ad02f17a7
+
+
+
diff --git a/graph/incidents_graphml/d/d822a7a0-fe97-11ed-a08d-35e4f0a9a870.graphml b/graph/incidents_graphml/d/d822a7a0-fe97-11ed-a08d-35e4f0a9a870.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..28e4d3436fa51248ce5f508d3b84f2121f175c2a
--- /dev/null
+++ b/graph/incidents_graphml/d/d822a7a0-fe97-11ed-a08d-35e4f0a9a870.graphml
@@ -0,0 +1,789 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.238
+ 100.64.21.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.46.2
+ 100.64.46.2
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.43
+ 100.64.7.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.3
+ 100.64.46.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.46.4
+ 100.64.46.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.167
+ 100.64.18.167
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.120
+ 100.64.9.120
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.5
+ 100.64.46.5
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.6
+ 100.64.46.6
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.8.112
+ 100.64.8.112
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.191
+ 100.64.27.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.46.7
+ 100.64.46.7
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.28
+ 100.64.8.28
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.8
+ 100.64.46.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.9
+ 100.64.46.9
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.10
+ 100.64.46.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.11
+ 100.64.46.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+ INCIDENT_LINK
+ 1685416363
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d822a7a0-fe97-11ed-a08d-35e4f0a9a870
+
+
+
diff --git a/graph/incidents_graphml/d/d8231470-6ef3-11ee-ab20-4f1e630cbb02.graphml b/graph/incidents_graphml/d/d8231470-6ef3-11ee-ab20-4f1e630cbb02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e28b0cb57a8cb5ad8eb7fda4c3e2bba24c70539f
--- /dev/null
+++ b/graph/incidents_graphml/d/d8231470-6ef3-11ee-ab20-4f1e630cbb02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.217
+ 100.64.27.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697770407
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8231470-6ef3-11ee-ab20-4f1e630cbb02
+
+
+
diff --git a/graph/incidents_graphml/d/d8269f60-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d8269f60-17ea-11ee-98ae-3df0911cfade.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7ee779580ca93f1f938602222554f888d3bf234
--- /dev/null
+++ b/graph/incidents_graphml/d/d8269f60-17ea-11ee-98ae-3df0911cfade.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.194
+ 100.64.74.194
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688200791
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8269f60-17ea-11ee-98ae-3df0911cfade
+
+
+
diff --git a/graph/incidents_graphml/d/d82ca830-2111-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/d/d82ca830-2111-11ee-bca7-0d1d0c9aa4ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7673d3b3a31b5449815767036ba620fc3badea4
--- /dev/null
+++ b/graph/incidents_graphml/d/d82ca830-2111-11ee-bca7-0d1d0c9aa4ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.146
+ 100.64.48.146
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689207102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d82ca830-2111-11ee-bca7-0d1d0c9aa4ab
+
+
+
diff --git a/graph/incidents_graphml/d/d82de9e0-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d82de9e0-f058-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8484cb380a90f0c519e88c186a853892c11358ad
--- /dev/null
+++ b/graph/incidents_graphml/d/d82de9e0-f058-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711997487
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d82de9e0-f058-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/d/d82e96f0-29b7-11ee-b86f-6b6c9ebf54e6.graphml b/graph/incidents_graphml/d/d82e96f0-29b7-11ee-b86f-6b6c9ebf54e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c439c741ab5f625e87d2843952f3e6c7628df4b4
--- /dev/null
+++ b/graph/incidents_graphml/d/d82e96f0-29b7-11ee-b86f-6b6c9ebf54e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.171
+ 100.64.19.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690158007
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d82e96f0-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+
diff --git a/graph/incidents_graphml/d/d8317630-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/d/d8317630-0bf4-11ee-9b02-ffb3de173f5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..954c2bb2a79d3f800e6b5b18352f2cf03e3c67c8
--- /dev/null
+++ b/graph/incidents_graphml/d/d8317630-0bf4-11ee-9b02-ffb3de173f5d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.203
+ 100.64.80.203
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.254
+ 100.64.76.254
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686885672
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8317630-0bf4-11ee-9b02-ffb3de173f5d
+
+
+ INCIDENT_LINK
+ 1686885672
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8317630-0bf4-11ee-9b02-ffb3de173f5d
+
+
+
diff --git a/graph/incidents_graphml/d/d8320890-6ef3-11ee-ab20-4f1e630cbb02.graphml b/graph/incidents_graphml/d/d8320890-6ef3-11ee-ab20-4f1e630cbb02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..459208c84569e841d4b176bfed556547f76ec1e6
--- /dev/null
+++ b/graph/incidents_graphml/d/d8320890-6ef3-11ee-ab20-4f1e630cbb02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.217
+ 100.64.27.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697770407
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d8320890-6ef3-11ee-ab20-4f1e630cbb02
+
+
+
diff --git a/graph/incidents_graphml/d/d8401ad0-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d8401ad0-17ea-11ee-98ae-3df0911cfade.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ebc96de71d94ec6be335b7cd2283f02a7092a20
--- /dev/null
+++ b/graph/incidents_graphml/d/d8401ad0-17ea-11ee-98ae-3df0911cfade.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.194
+ 100.64.74.194
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688200791
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d8401ad0-17ea-11ee-98ae-3df0911cfade
+
+
+
diff --git a/graph/incidents_graphml/d/d8476f30-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/d/d8476f30-0bf4-11ee-9b02-ffb3de173f5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e125c6faa9dcad865ccab1950e8f21bd78171c4
--- /dev/null
+++ b/graph/incidents_graphml/d/d8476f30-0bf4-11ee-9b02-ffb3de173f5d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.203
+ 100.64.7.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.253
+ 100.64.70.253
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686885672
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8476f30-0bf4-11ee-9b02-ffb3de173f5d
+
+
+ INCIDENT_LINK
+ 1686885672
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8476f30-0bf4-11ee-9b02-ffb3de173f5d
+
+
+
diff --git a/graph/incidents_graphml/d/d84e2490-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d84e2490-17ea-11ee-98ae-3df0911cfade.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a595d8a8b5227efbd7d4b14eabe0c3d0ab9ef0f
--- /dev/null
+++ b/graph/incidents_graphml/d/d84e2490-17ea-11ee-98ae-3df0911cfade.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.153
+ 100.64.79.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688200791
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d84e2490-17ea-11ee-98ae-3df0911cfade
+
+
+
diff --git a/graph/incidents_graphml/d/d8628870-efe8-11ec-a293-5b334d10f0f6.graphml b/graph/incidents_graphml/d/d8628870-efe8-11ec-a293-5b334d10f0f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8daaef518001b368015d2e97358a4b0a7113cf15
--- /dev/null
+++ b/graph/incidents_graphml/d/d8628870-efe8-11ec-a293-5b334d10f0f6.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.187
+ 100.64.81.187
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.170
+ USER-0015-1679.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.188
+ 100.64.81.188
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.189
+ 100.64.81.189
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655654388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8628870-efe8-11ec-a293-5b334d10f0f6
+
+
+ INCIDENT_LINK
+ 1655654388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8628870-efe8-11ec-a293-5b334d10f0f6
+
+
+ INCIDENT_LINK
+ 1655654388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8628870-efe8-11ec-a293-5b334d10f0f6
+
+
+ INCIDENT_LINK
+ 1655654388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8628870-efe8-11ec-a293-5b334d10f0f6
+
+
+ INCIDENT_LINK
+ 1655654388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8628870-efe8-11ec-a293-5b334d10f0f6
+
+
+ INCIDENT_LINK
+ 1655654388
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8628870-efe8-11ec-a293-5b334d10f0f6
+
+
+
diff --git a/graph/incidents_graphml/d/d865c7c0-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/d/d865c7c0-ab6c-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e077bc0a33d38615ff5fcc7a101a6e9f2fd40a1
--- /dev/null
+++ b/graph/incidents_graphml/d/d865c7c0-ab6c-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.94
+ 100.64.88.94
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1676271949
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d865c7c0-ab6c-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/d/d865e9d0-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d865e9d0-f058-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1f9ab065b5ebf77ff2529ba5db18652561f1b87
--- /dev/null
+++ b/graph/incidents_graphml/d/d865e9d0-f058-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.190
+ 100.64.27.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711997487
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d865e9d0-f058-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/d/d86ad0d0-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/d/d86ad0d0-ab6c-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83ec9510c7faf6ac1db5b71f5d47e83633395089
--- /dev/null
+++ b/graph/incidents_graphml/d/d86ad0d0-ab6c-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.94
+ 100.64.88.94
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676271949
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d86ad0d0-ab6c-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/d/d874ddf0-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d874ddf0-f058-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0452b932e6175594885b96fd234a42b89957aa9
--- /dev/null
+++ b/graph/incidents_graphml/d/d874ddf0-f058-11ee-abdc-892822517928.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.59
+ 100.64.13.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711997487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d874ddf0-f058-11ee-abdc-892822517928
+
+
+ INCIDENT_LINK
+ 1711997487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d874ddf0-f058-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/d/d87af270-efe8-11ec-a293-5b334d10f0f6.graphml b/graph/incidents_graphml/d/d87af270-efe8-11ec-a293-5b334d10f0f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7d1a3d1c7999ae3d07f12ecd9966467d4fffaf2
--- /dev/null
+++ b/graph/incidents_graphml/d/d87af270-efe8-11ec-a293-5b334d10f0f6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.193
+ 100.64.81.193
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.36
+ 100.64.73.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655654388
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d87af270-efe8-11ec-a293-5b334d10f0f6
+
+
+ INCIDENT_LINK
+ 1655654388
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d87af270-efe8-11ec-a293-5b334d10f0f6
+
+
+
diff --git a/graph/incidents_graphml/d/d87c5b80-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/d/d87c5b80-0010-11ef-83c1-e54678fd0000.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a208f3f274164bb8091764b8af6a588cc397d64
--- /dev/null
+++ b/graph/incidents_graphml/d/d87c5b80-0010-11ef-83c1-e54678fd0000.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.170
+ 100.64.69.170
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1713725782
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d87c5b80-0010-11ef-83c1-e54678fd0000
+
+
+
diff --git a/graph/incidents_graphml/d/d87e5da0-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/d87e5da0-0cb8-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a1e76dad4bf69c06d51022aefa29c63a8079fd8
--- /dev/null
+++ b/graph/incidents_graphml/d/d87e5da0-0cb8-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.149
+ USER-0015-1476.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686969854
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d87e5da0-0cb8-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/d/d87f68c0-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/d/d87f68c0-0010-11ef-83c1-e54678fd0000.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98ca557792e218685aeb0e5abfffc3045410d579
--- /dev/null
+++ b/graph/incidents_graphml/d/d87f68c0-0010-11ef-83c1-e54678fd0000.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]
+
+
+ HOST
+ 100.64.69.170
+ 100.64.69.170
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713725782
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d87f68c0-0010-11ef-83c1-e54678fd0000
+
+
+
diff --git a/graph/incidents_graphml/d/d880ef60-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/d/d880ef60-0010-11ef-83c1-e54678fd0000.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f036c7a0251478b4b784a39558ffb85e5d7e154e
--- /dev/null
+++ b/graph/incidents_graphml/d/d880ef60-0010-11ef-83c1-e54678fd0000.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.136
+ 100.64.12.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1713725782
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d880ef60-0010-11ef-83c1-e54678fd0000
+
+
+
diff --git a/graph/incidents_graphml/d/d8831240-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/d/d8831240-0010-11ef-83c1-e54678fd0000.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88d31a66644990e84aac7ad3cb3128b919c2cd4c
--- /dev/null
+++ b/graph/incidents_graphml/d/d8831240-0010-11ef-83c1-e54678fd0000.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.12.136
+ 100.64.12.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713725782
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ d8831240-0010-11ef-83c1-e54678fd0000
+
+
+
diff --git a/graph/incidents_graphml/d/d8850a90-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d8850a90-f058-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c47f9195e723630b05ba44cf5de9688d03e11778
--- /dev/null
+++ b/graph/incidents_graphml/d/d8850a90-f058-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.59
+ 100.64.13.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711997487
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8850a90-f058-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/d/d8855c80-1e11-11ee-9177-87bbc2825325.graphml b/graph/incidents_graphml/d/d8855c80-1e11-11ee-9177-87bbc2825325.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a572ac748f13e51dbc9661337e860da99d3c55b
--- /dev/null
+++ b/graph/incidents_graphml/d/d8855c80-1e11-11ee-9177-87bbc2825325.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.188
+ 100.64.18.188
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.91
+ 100.64.72.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.25.238
+ 100.64.25.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.55
+ 100.64.83.55
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.36.166
+ 100.64.36.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.21.148
+ 100.64.21.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688877249
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8855c80-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877249
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8855c80-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877249
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8855c80-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877249
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8855c80-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877249
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8855c80-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877249
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8855c80-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877249
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8855c80-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877249
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8855c80-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877249
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8855c80-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877249
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8855c80-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877249
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8855c80-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877249
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8855c80-1e11-11ee-9177-87bbc2825325
+
+
+
diff --git a/graph/incidents_graphml/d/d8878a50-36c6-11ee-b2fc-7d6cdcd897bf.graphml b/graph/incidents_graphml/d/d8878a50-36c6-11ee-b2fc-7d6cdcd897bf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56273a6cf33bad761dfd87a747a52fff66476f58
--- /dev/null
+++ b/graph/incidents_graphml/d/d8878a50-36c6-11ee-b2fc-7d6cdcd897bf.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.181
+ 100.64.62.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.107
+ 100.64.27.107
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.47
+ 100.64.34.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.182
+ 100.64.62.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.18
+ 100.64.7.18
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.113
+ 100.64.59.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.59
+ 100.64.5.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.183
+ 100.64.62.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.184
+ 100.64.62.184
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.185
+ 100.64.62.185
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.186
+ 100.64.62.186
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.187
+ 100.64.62.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.12
+ 100.64.17.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.188
+ 100.64.62.188
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.189
+ 100.64.62.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.190
+ 100.64.62.190
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.191
+ USER-0015-1450.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.152
+ 100.64.51.152
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.192
+ 100.64.62.192
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593816
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8878a50-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+
diff --git a/graph/incidents_graphml/d/d8929f20-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d8929f20-f058-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52ad34d50c9a6a4fbe8d3b57dc1177bd1ee46e9d
--- /dev/null
+++ b/graph/incidents_graphml/d/d8929f20-f058-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.227
+ 100.64.35.227
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711997487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8929f20-f058-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/d/d8a45f50-285b-11ee-a03d-7b364f1dc27e.graphml b/graph/incidents_graphml/d/d8a45f50-285b-11ee-a03d-7b364f1dc27e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8a11bc84677a6c345addb85c208cb947e99f82c
--- /dev/null
+++ b/graph/incidents_graphml/d/d8a45f50-285b-11ee-a03d-7b364f1dc27e.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.219
+ 100.64.32.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.220
+ 100.64.32.220
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.221
+ USER-0015-1293.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.206
+ 100.64.6.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.222
+ 100.64.32.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.223
+ 100.64.32.223
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.71
+ 100.64.10.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.224
+ 100.64.32.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.225
+ 100.64.32.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8a45f50-285b-11ee-a03d-7b364f1dc27e
+
+
+
diff --git a/graph/incidents_graphml/d/d8ae8e80-f0fb-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/d/d8ae8e80-f0fb-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..124817bf10d9142e20e30fbf4ba9adf3254b22c1
--- /dev/null
+++ b/graph/incidents_graphml/d/d8ae8e80-f0fb-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.166
+ 100.64.25.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712067495
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8ae8e80-f0fb-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/d/d8b81cf0-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d8b81cf0-2084-11ed-a2df-9fe2f28e2833.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b35315a6dffef070ae49f597b653da37e45d006
--- /dev/null
+++ b/graph/incidents_graphml/d/d8b81cf0-2084-11ed-a2df-9fe2f28e2833.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.79
+ 100.64.93.79
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660999046
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8b81cf0-2084-11ed-a2df-9fe2f28e2833
+
+
+
diff --git a/graph/incidents_graphml/d/d8bb90d0-285b-11ee-a03d-7b364f1dc27e.graphml b/graph/incidents_graphml/d/d8bb90d0-285b-11ee-a03d-7b364f1dc27e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0bd51efc6da0b2c8a19adb0cb0028951400c2f49
--- /dev/null
+++ b/graph/incidents_graphml/d/d8bb90d0-285b-11ee-a03d-7b364f1dc27e.graphml
@@ -0,0 +1,481 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.233
+ USER-0015-1294.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.234
+ 100.64.32.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.235
+ 100.64.32.235
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.236
+ 100.64.32.236
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.14
+ 100.64.5.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.237
+ 100.64.32.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.238
+ 100.64.32.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.239
+ 100.64.32.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.240
+ 100.64.32.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.233
+ 100.64.31.233
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+ INCIDENT_LINK
+ 1690008543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8bb90d0-285b-11ee-a03d-7b364f1dc27e
+
+
+
diff --git a/graph/incidents_graphml/d/d8c2c690-7aca-11ee-8dd4-f72b2f730b80.graphml b/graph/incidents_graphml/d/d8c2c690-7aca-11ee-8dd4-f72b2f730b80.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27c0e6e999ca9e3d0be6a02236f572c21f1b3a88
--- /dev/null
+++ b/graph/incidents_graphml/d/d8c2c690-7aca-11ee-8dd4-f72b2f730b80.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1699072213
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d8c2c690-7aca-11ee-8dd4-f72b2f730b80
+
+
+
diff --git a/graph/incidents_graphml/d/d8c69be0-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d8c69be0-2084-11ed-a2df-9fe2f28e2833.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e718b81e1fe6f48060bdb690a76614d05cbec30
--- /dev/null
+++ b/graph/incidents_graphml/d/d8c69be0-2084-11ed-a2df-9fe2f28e2833.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.79
+ 100.64.93.79
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660999046
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d8c69be0-2084-11ed-a2df-9fe2f28e2833
+
+
+
diff --git a/graph/incidents_graphml/d/d8cd80f0-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/d/d8cd80f0-f135-11ec-9654-cb9d1f320859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..748d57ba1b25fce88e2798326203b22210670eb1
--- /dev/null
+++ b/graph/incidents_graphml/d/d8cd80f0-f135-11ec-9654-cb9d1f320859.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.40
+ 100.64.75.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.232
+ 100.64.71.232
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8cd80f0-f135-11ec-9654-cb9d1f320859
+
+
+ INCIDENT_LINK
+ 1655797411
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8cd80f0-f135-11ec-9654-cb9d1f320859
+
+
+
diff --git a/graph/incidents_graphml/d/d8cdc4f0-097d-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/d/d8cdc4f0-097d-11ee-8b37-9ba18759a170.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6957e691259ed20c980ebf82b3d3ca78c6e1747
--- /dev/null
+++ b/graph/incidents_graphml/d/d8cdc4f0-097d-11ee-8b37-9ba18759a170.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.87
+ 100.64.68.87
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.23.158
+ 100.64.23.158
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686614660
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8cdc4f0-097d-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614660
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8cdc4f0-097d-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614660
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8cdc4f0-097d-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614660
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8cdc4f0-097d-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614660
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8cdc4f0-097d-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614660
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8cdc4f0-097d-11ee-8b37-9ba18759a170
+
+
+
diff --git a/graph/incidents_graphml/d/d8ceb230-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d8ceb230-2084-11ed-a2df-9fe2f28e2833.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17adcc9483e64cfcac7367d0d90980494ac52030
--- /dev/null
+++ b/graph/incidents_graphml/d/d8ceb230-2084-11ed-a2df-9fe2f28e2833.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.41
+ 100.64.76.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660999046
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ d8ceb230-2084-11ed-a2df-9fe2f28e2833
+
+
+
diff --git a/graph/incidents_graphml/d/d8d73db0-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d8d73db0-2084-11ed-a2df-9fe2f28e2833.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4b0e37306e4813cf472a4026813c7ad12ec3820
--- /dev/null
+++ b/graph/incidents_graphml/d/d8d73db0-2084-11ed-a2df-9fe2f28e2833.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.76.41
+ 100.64.76.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660999046
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d8d73db0-2084-11ed-a2df-9fe2f28e2833
+
+
+
diff --git a/graph/incidents_graphml/d/d8db0e40-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d8db0e40-2084-11ed-a2df-9fe2f28e2833.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..016dd3feeb99d13faf22809a35fb46ab708c530d
--- /dev/null
+++ b/graph/incidents_graphml/d/d8db0e40-2084-11ed-a2df-9fe2f28e2833.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.198
+ 100.64.51.198
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660999046
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d8db0e40-2084-11ed-a2df-9fe2f28e2833
+
+
+
diff --git a/graph/incidents_graphml/d/d8ebca50-15b5-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/d/d8ebca50-15b5-11ef-8b2e-b54e20f7e466.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9271e7e8dbbcf016fd957e7d20144ed4171f930
--- /dev/null
+++ b/graph/incidents_graphml/d/d8ebca50-15b5-11ef-8b2e-b54e20f7e466.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.93
+ 100.64.95.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.95.94
+ 100.64.95.94
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.18
+ 100.64.5.18
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.95
+ 100.64.95.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716105624
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8ebca50-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105624
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8ebca50-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105624
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8ebca50-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105624
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8ebca50-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105624
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8ebca50-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105624
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8ebca50-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105624
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8ebca50-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105624
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d8ebca50-15b5-11ef-8b2e-b54e20f7e466
+
+
+
diff --git a/graph/incidents_graphml/d/d8f35f40-5c88-11ee-8e0e-93298c809ccb.graphml b/graph/incidents_graphml/d/d8f35f40-5c88-11ee-8e0e-93298c809ccb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29e9c2b444c64ac53cd97b4d224391b56bdd6341
--- /dev/null
+++ b/graph/incidents_graphml/d/d8f35f40-5c88-11ee-8e0e-93298c809ccb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.11.33
+ 100.64.11.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1695745332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ d8f35f40-5c88-11ee-8e0e-93298c809ccb
+
+
+ INCIDENT_LINK
+ 1695745332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ d8f35f40-5c88-11ee-8e0e-93298c809ccb
+
+
+
diff --git a/graph/incidents_graphml/d/d9020c90-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/d9020c90-0cb8-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfa26e1f387461a3f1728012700a07bf93316635
--- /dev/null
+++ b/graph/incidents_graphml/d/d9020c90-0cb8-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.151
+ 100.64.66.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686969855
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9020c90-0cb8-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686969855
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9020c90-0cb8-11ee-9777-83d870147fdf
+
+
+ INCIDENT_LINK
+ 1686969855
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9020c90-0cb8-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/d/d910fa10-435e-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/d/d910fa10-435e-11ef-9e66-fd84d5bf3736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f88ccd577a3b1823e4fda9ac0da1c3495a432817
--- /dev/null
+++ b/graph/incidents_graphml/d/d910fa10-435e-11ef-9e66-fd84d5bf3736.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.105
+ 100.64.20.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721126012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d910fa10-435e-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d910fa10-435e-11ef-9e66-fd84d5bf3736
+
+
+
diff --git a/graph/incidents_graphml/d/d916cb10-2efc-11ee-bea9-c5ecb1b621be.graphml b/graph/incidents_graphml/d/d916cb10-2efc-11ee-bea9-c5ecb1b621be.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc96f3a37f884568aec362e790ab522a1a362540
--- /dev/null
+++ b/graph/incidents_graphml/d/d916cb10-2efc-11ee-bea9-c5ecb1b621be.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.233
+ 100.64.81.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.249
+ 100.64.73.249
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690737400
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d916cb10-2efc-11ee-bea9-c5ecb1b621be
+
+
+
diff --git a/graph/incidents_graphml/d/d91c8d80-3170-11ef-ac7f-916edbe5b1d5.graphml b/graph/incidents_graphml/d/d91c8d80-3170-11ef-ac7f-916edbe5b1d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..751abccfa4857d1d5e2c9e112496d8f896b1f8e1
--- /dev/null
+++ b/graph/incidents_graphml/d/d91c8d80-3170-11ef-ac7f-916edbe5b1d5.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.197
+ 100.64.43.197
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.26
+ 100.64.60.26
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.183
+ 100.64.15.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.27
+ 100.64.60.27
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.28
+ 100.64.60.28
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.29
+ 100.64.60.29
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.13
+ 100.64.11.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.4
+ 100.64.60.4
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.203
+ 100.64.37.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.30
+ 100.64.60.30
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.77
+ 100.64.49.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.31
+ 100.64.60.31
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.223
+ USER-0015-1438.example.internal
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.32
+ 100.64.60.32
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.33
+ 100.64.60.33
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+ INCIDENT_LINK
+ 1719154622
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d91c8d80-3170-11ef-ac7f-916edbe5b1d5
+
+
+
diff --git a/graph/incidents_graphml/d/d9321b40-2efc-11ee-bea9-c5ecb1b621be.graphml b/graph/incidents_graphml/d/d9321b40-2efc-11ee-bea9-c5ecb1b621be.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44b739f4243fe23cc44219c3dca169d69cf83db2
--- /dev/null
+++ b/graph/incidents_graphml/d/d9321b40-2efc-11ee-bea9-c5ecb1b621be.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.249
+ 100.64.73.249
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.233
+ 100.64.81.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690737400
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9321b40-2efc-11ee-bea9-c5ecb1b621be
+
+
+
diff --git a/graph/incidents_graphml/d/d9335c10-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/d/d9335c10-bcf3-11ed-9421-6db30872eff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa8edd9f91eef7a6d3d22922847fd7c662aa3728
--- /dev/null
+++ b/graph/incidents_graphml/d/d9335c10-bcf3-11ed-9421-6db30872eff3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.47
+ 100.64.82.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678199102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9335c10-bcf3-11ed-9421-6db30872eff3
+
+
+
diff --git a/graph/incidents_graphml/d/d9381700-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/d/d9381700-bcf3-11ed-9421-6db30872eff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1017339ba1b034138f33a920c8f153d6630e5a70
--- /dev/null
+++ b/graph/incidents_graphml/d/d9381700-bcf3-11ed-9421-6db30872eff3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.82.47
+ 100.64.82.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678199102
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9381700-bcf3-11ed-9421-6db30872eff3
+
+
+
diff --git a/graph/incidents_graphml/d/d93c5670-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/d93c5670-0cb8-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..035d248d9bce0a91ba7733c0e8d5d6ec7dd3406d
--- /dev/null
+++ b/graph/incidents_graphml/d/d93c5670-0cb8-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.151
+ 100.64.66.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686969855
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ d93c5670-0cb8-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/d/d93dbc50-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/d/d93dbc50-bcf3-11ed-9421-6db30872eff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92e00bad65c7971f2fec8f1bd07004e187b27664
--- /dev/null
+++ b/graph/incidents_graphml/d/d93dbc50-bcf3-11ed-9421-6db30872eff3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.47
+ 100.64.86.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678199102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d93dbc50-bcf3-11ed-9421-6db30872eff3
+
+
+
diff --git a/graph/incidents_graphml/d/d94165d0-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/d/d94165d0-bcf3-11ed-9421-6db30872eff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2eec2ff7bd7fb05bb982bd218ee51b5aad8c252f
--- /dev/null
+++ b/graph/incidents_graphml/d/d94165d0-bcf3-11ed-9421-6db30872eff3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.47
+ 100.64.86.47
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678199102
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d94165d0-bcf3-11ed-9421-6db30872eff3
+
+
+
diff --git a/graph/incidents_graphml/d/d941f820-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/d941f820-1b7b-11ed-8ae2-15a147a6b00c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77ad9d87e0c69e61c1bb58f589c0df6b157a8cdd
--- /dev/null
+++ b/graph/incidents_graphml/d/d941f820-1b7b-11ed-8ae2-15a147a6b00c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.139
+ 100.64.80.139
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.234
+ 100.64.70.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660445425
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d941f820-1b7b-11ed-8ae2-15a147a6b00c
+
+
+
diff --git a/graph/incidents_graphml/d/d9445ae0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d9445ae0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a3e4922f4e8f21a891063afc079b90416afd31f
--- /dev/null
+++ b/graph/incidents_graphml/d/d9445ae0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.248
+ 100.64.19.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712924772
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d9445ae0-f8c7-11ee-baa1-bf8b9aebe6d6
+
+
+
diff --git a/graph/incidents_graphml/d/d9518880-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/d9518880-1b7b-11ed-8ae2-15a147a6b00c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..021a3f727e6e3666946d1360e928e7f342f10042
--- /dev/null
+++ b/graph/incidents_graphml/d/d9518880-1b7b-11ed-8ae2-15a147a6b00c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.234
+ 100.64.70.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.139
+ 100.64.80.139
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660445425
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9518880-1b7b-11ed-8ae2-15a147a6b00c
+
+
+
diff --git a/graph/incidents_graphml/d/d955afd0-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/d955afd0-6e29-11ee-b3d5-39e2e796f8b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e410b01b8a489d4382b807a3f375ef89622c2bd
--- /dev/null
+++ b/graph/incidents_graphml/d/d955afd0-6e29-11ee-b3d5-39e2e796f8b3.graphml
@@ -0,0 +1,481 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.194
+ 100.64.51.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.248
+ 100.64.8.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.159
+ 100.64.14.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.196
+ 100.64.51.196
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.197
+ 100.64.51.197
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.125
+ 100.64.44.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.47
+ 100.64.46.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.115
+ 100.64.33.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.198
+ 100.64.51.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.104
+ 100.64.41.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+ INCIDENT_LINK
+ 1697683651
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d955afd0-6e29-11ee-b3d5-39e2e796f8b3
+
+
+
diff --git a/graph/incidents_graphml/d/d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7.graphml b/graph/incidents_graphml/d/d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..339d30ade01c5610b36f58bf13fa849b6a354c6a
--- /dev/null
+++ b/graph/incidents_graphml/d/d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7.graphml
@@ -0,0 +1,193 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.86
+ 100.64.71.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.87
+ 100.64.71.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.88
+ 100.64.71.88
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.250
+ 100.64.70.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.89
+ 100.64.71.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.90
+ 100.64.71.90
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662521183
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7
+
+
+ INCIDENT_LINK
+ 1662521183
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7
+
+
+ INCIDENT_LINK
+ 1662521183
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7
+
+
+ INCIDENT_LINK
+ 1662521183
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7
+
+
+ INCIDENT_LINK
+ 1662521183
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7
+
+
+ INCIDENT_LINK
+ 1662521183
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7
+
+
+ INCIDENT_LINK
+ 1662521183
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7
+
+
+ INCIDENT_LINK
+ 1662521183
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7
+
+
+
diff --git a/graph/incidents_graphml/d/d95746a0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d95746a0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc2676854d1390a44143282debc2b7b1cd447692
--- /dev/null
+++ b/graph/incidents_graphml/d/d95746a0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.248
+ 100.64.19.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1712924772
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d95746a0-f8c7-11ee-baa1-bf8b9aebe6d6
+
+
+
diff --git a/graph/incidents_graphml/d/d9586690-11ca-11ef-a994-fb0e1dc0413b.graphml b/graph/incidents_graphml/d/d9586690-11ca-11ef-a994-fb0e1dc0413b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea7d13b44587062f8db355cd129b326240286aae
--- /dev/null
+++ b/graph/incidents_graphml/d/d9586690-11ca-11ef-a994-fb0e1dc0413b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.110
+ 100.64.8.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715674840
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9586690-11ca-11ef-a994-fb0e1dc0413b
+
+
+
diff --git a/graph/incidents_graphml/d/d9690c20-2031-11ed-9c49-d577d9b7e617.graphml b/graph/incidents_graphml/d/d9690c20-2031-11ed-9c49-d577d9b7e617.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..003caabc277ff22cf63da3d3656c103145490d13
--- /dev/null
+++ b/graph/incidents_graphml/d/d9690c20-2031-11ed-9c49-d577d9b7e617.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.197
+ 100.64.79.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.139
+ 100.64.71.139
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660963399
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d9690c20-2031-11ed-9c49-d577d9b7e617
+
+
+
diff --git a/graph/incidents_graphml/d/d96c2e30-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d96c2e30-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7ee683f484e292621a012832941751acde3dd03
--- /dev/null
+++ b/graph/incidents_graphml/d/d96c2e30-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.236
+ 100.64.40.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712924772
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d96c2e30-f8c7-11ee-baa1-bf8b9aebe6d6
+
+
+
diff --git a/graph/incidents_graphml/d/d96c9e90-f6b2-11ee-b30f-810e76324c4a.graphml b/graph/incidents_graphml/d/d96c9e90-f6b2-11ee-b30f-810e76324c4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c7cd79b265fb3e502a9d1b091e2470b35387adb
--- /dev/null
+++ b/graph/incidents_graphml/d/d96c9e90-f6b2-11ee-b30f-810e76324c4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.155
+ 100.64.52.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712695850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d96c9e90-f6b2-11ee-b30f-810e76324c4a
+
+
+
diff --git a/graph/incidents_graphml/d/d9765290-2031-11ed-9c49-d577d9b7e617.graphml b/graph/incidents_graphml/d/d9765290-2031-11ed-9c49-d577d9b7e617.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..419520abea5b4c52749082abdbf33fd9bc7829ef
--- /dev/null
+++ b/graph/incidents_graphml/d/d9765290-2031-11ed-9c49-d577d9b7e617.graphml
@@ -0,0 +1,215 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.246
+ 100.64.70.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.151
+ 100.64.71.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.198
+ 100.64.79.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.119
+ 100.64.71.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.199
+ 100.64.79.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.53
+ 100.64.1.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.200
+ 100.64.79.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660963399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9765290-2031-11ed-9c49-d577d9b7e617
+
+
+ INCIDENT_LINK
+ 1660963399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9765290-2031-11ed-9c49-d577d9b7e617
+
+
+ INCIDENT_LINK
+ 1660963399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9765290-2031-11ed-9c49-d577d9b7e617
+
+
+ INCIDENT_LINK
+ 1660963399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9765290-2031-11ed-9c49-d577d9b7e617
+
+
+ INCIDENT_LINK
+ 1660963399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9765290-2031-11ed-9c49-d577d9b7e617
+
+
+ INCIDENT_LINK
+ 1660963399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9765290-2031-11ed-9c49-d577d9b7e617
+
+
+ INCIDENT_LINK
+ 1660963399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9765290-2031-11ed-9c49-d577d9b7e617
+
+
+ INCIDENT_LINK
+ 1660963399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9765290-2031-11ed-9c49-d577d9b7e617
+
+
+ INCIDENT_LINK
+ 1660963399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9765290-2031-11ed-9c49-d577d9b7e617
+
+
+
diff --git a/graph/incidents_graphml/d/d9844a10-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d9844a10-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..058c4c935ea39db0bea8014a9d4598e0adf24bb6
--- /dev/null
+++ b/graph/incidents_graphml/d/d9844a10-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.236
+ 100.64.40.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712924772
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9844a10-f8c7-11ee-baa1-bf8b9aebe6d6
+
+
+
diff --git a/graph/incidents_graphml/d/d998e380-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d998e380-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..999dfe888b8ac755688661f813f542fc03053610
--- /dev/null
+++ b/graph/incidents_graphml/d/d998e380-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.112
+ 100.64.8.112
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712924772
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d998e380-f8c7-11ee-baa1-bf8b9aebe6d6
+
+
+
diff --git a/graph/incidents_graphml/d/d9ac6140-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/d9ac6140-9562-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42787e724f0032747588f588ddd48b5c3d3694be
--- /dev/null
+++ b/graph/incidents_graphml/d/d9ac6140-9562-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.116
+ 100.64.71.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.129
+ 100.64.72.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.235
+ 100.64.71.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.78.164
+ 100.64.78.164
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.69.182
+ 100.64.69.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.165
+ 100.64.78.165
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1673848730
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9ac6140-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848730
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9ac6140-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848730
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9ac6140-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848730
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9ac6140-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848730
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9ac6140-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848730
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9ac6140-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848730
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9ac6140-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848730
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9ac6140-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848730
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9ac6140-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848730
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9ac6140-9562-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/d/d9c2d9b0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d9c2d9b0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f7167a606b80d27e053c35095e112e9cc9c5582
--- /dev/null
+++ b/graph/incidents_graphml/d/d9c2d9b0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.142
+ 100.64.15.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712924773
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d9c2d9b0-f8c7-11ee-baa1-bf8b9aebe6d6
+
+
+
diff --git a/graph/incidents_graphml/d/d9d51400-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/d9d51400-0cb8-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..efd31ca1e8e14924032939ac26c7473427e41d91
--- /dev/null
+++ b/graph/incidents_graphml/d/d9d51400-0cb8-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.128
+ 100.64.3.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686969856
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ d9d51400-0cb8-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/d/d9eaad00-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d9eaad00-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa20b7a63e31c31288b2a2fe5106104b25814ec6
--- /dev/null
+++ b/graph/incidents_graphml/d/d9eaad00-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.238
+ 100.64.40.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712924773
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9eaad00-f8c7-11ee-baa1-bf8b9aebe6d6
+
+
+
diff --git a/graph/incidents_graphml/d/d9f175a0-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/d9f175a0-0cb8-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..01d553d7d3cc8fa6a05d95e8817ac4e7774b5979
--- /dev/null
+++ b/graph/incidents_graphml/d/d9f175a0-0cb8-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.128
+ 100.64.3.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686969856
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ d9f175a0-0cb8-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/d/d9f98360-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/d/d9f98360-13f4-11ee-9bb8-6b8312f57fd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ada942fd126cf9cca7fc1f37c2b226b9cbed3cfb
--- /dev/null
+++ b/graph/incidents_graphml/d/d9f98360-13f4-11ee-9bb8-6b8312f57fd1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.63
+ USER-0015-1644.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687765284
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d9f98360-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765284
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ d9f98360-13f4-11ee-9bb8-6b8312f57fd1
+
+
+
diff --git a/graph/incidents_graphml/d/da0c8a20-fcd2-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/d/da0c8a20-fcd2-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06b4d718958b7630637b59f3bc015dd28f4dd50d
--- /dev/null
+++ b/graph/incidents_graphml/d/da0c8a20-fcd2-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.145
+ 100.64.8.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685221805
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ da0c8a20-fcd2-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1685221805
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ da0c8a20-fcd2-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/d/da237040-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/da237040-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3b360e5321c6e2e9a098c570cb7612ae3f208fa
--- /dev/null
+++ b/graph/incidents_graphml/d/da237040-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.143
+ 100.64.24.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712924773
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ da237040-f8c7-11ee-baa1-bf8b9aebe6d6
+
+
+
diff --git a/graph/incidents_graphml/d/da2a21a0-5792-11ee-97ff-3b19ab007f30.graphml b/graph/incidents_graphml/d/da2a21a0-5792-11ee-97ff-3b19ab007f30.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93b5d0a9f2a7606756c63964498fa2de39d93c0f
--- /dev/null
+++ b/graph/incidents_graphml/d/da2a21a0-5792-11ee-97ff-3b19ab007f30.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.10
+ 100.64.37.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.26.235
+ 100.64.26.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695199873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ da2a21a0-5792-11ee-97ff-3b19ab007f30
+
+
+ INCIDENT_LINK
+ 1695199873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ da2a21a0-5792-11ee-97ff-3b19ab007f30
+
+
+ INCIDENT_LINK
+ 1695199873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ da2a21a0-5792-11ee-97ff-3b19ab007f30
+
+
+ INCIDENT_LINK
+ 1695199873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ da2a21a0-5792-11ee-97ff-3b19ab007f30
+
+
+
diff --git a/graph/incidents_graphml/d/da3daf00-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/da3daf00-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2390ba8906780df176aa842e8e2a47fa7e6288c0
--- /dev/null
+++ b/graph/incidents_graphml/d/da3daf00-f8c7-11ee-baa1-bf8b9aebe6d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.143
+ 100.64.24.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712924773
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ da3daf00-f8c7-11ee-baa1-bf8b9aebe6d6
+
+
+
diff --git a/graph/incidents_graphml/d/da429ce0-1e11-11ee-9177-87bbc2825325.graphml b/graph/incidents_graphml/d/da429ce0-1e11-11ee-9177-87bbc2825325.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac169662113f23447a4dba9e291a58f64b9f5cca
--- /dev/null
+++ b/graph/incidents_graphml/d/da429ce0-1e11-11ee-9177-87bbc2825325.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.68
+ 100.64.30.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.51
+ 100.64.72.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.63.52
+ 100.64.63.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.57.211
+ 100.64.57.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688877252
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ da429ce0-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877252
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ da429ce0-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877252
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ da429ce0-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877252
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ da429ce0-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877252
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ da429ce0-1e11-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688877252
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ da429ce0-1e11-11ee-9177-87bbc2825325
+
+
+
diff --git a/graph/incidents_graphml/d/da47c880-076a-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/d/da47c880-076a-11ef-93a8-d78cfa287885.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b02565e3772f16b90e7fa2ab4c7fff98b73911f3
--- /dev/null
+++ b/graph/incidents_graphml/d/da47c880-076a-11ef-93a8-d78cfa287885.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.94.7
+ 100.64.94.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714534098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ da47c880-076a-11ef-93a8-d78cfa287885
+
+
+
diff --git a/graph/incidents_graphml/d/da668e60-5792-11ee-97ff-3b19ab007f30.graphml b/graph/incidents_graphml/d/da668e60-5792-11ee-97ff-3b19ab007f30.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e6ea6734e32d33f10b9b77975d27b421ad7b662
--- /dev/null
+++ b/graph/incidents_graphml/d/da668e60-5792-11ee-97ff-3b19ab007f30.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.88
+ 100.64.12.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1695199873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ da668e60-5792-11ee-97ff-3b19ab007f30
+
+
+ INCIDENT_LINK
+ 1695199873
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ da668e60-5792-11ee-97ff-3b19ab007f30
+
+
+
diff --git a/graph/incidents_graphml/d/da86d550-0983-11ef-a068-8dbaaaaf6c28.graphml b/graph/incidents_graphml/d/da86d550-0983-11ef-a068-8dbaaaaf6c28.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..720ec02ddf692f02a347e0b7338ac0b8bb08114e
--- /dev/null
+++ b/graph/incidents_graphml/d/da86d550-0983-11ef-a068-8dbaaaaf6c28.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.121
+ 100.64.62.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714764738
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ da86d550-0983-11ef-a068-8dbaaaaf6c28
+
+
+
diff --git a/graph/incidents_graphml/d/da888580-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/da888580-0cb8-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42dc6ebf483acae7229441aa52374fda0c8996f3
--- /dev/null
+++ b/graph/incidents_graphml/d/da888580-0cb8-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.236
+ 100.64.17.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686969857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ da888580-0cb8-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/d/daa05110-9508-11ed-bd9f-81e534a2ee12.graphml b/graph/incidents_graphml/d/daa05110-9508-11ed-bd9f-81e534a2ee12.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2497f2c07de3b384d95ade302b447d86e0415ae5
--- /dev/null
+++ b/graph/incidents_graphml/d/daa05110-9508-11ed-bd9f-81e534a2ee12.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.77
+ 100.64.84.77
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.0.145.98
+ USER-0015-0957.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1673810077
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ daa05110-9508-11ed-bd9f-81e534a2ee12
+
+
+
diff --git a/graph/incidents_graphml/d/daa853d0-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/d/daa853d0-92f9-11ed-844e-b1b9f26efb97.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d40acdacdba2885f6c4ffb5408b1df5e0679d0fa
--- /dev/null
+++ b/graph/incidents_graphml/d/daa853d0-92f9-11ed-844e-b1b9f26efb97.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.104
+ 100.64.85.104
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1968.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1673583733
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ daa853d0-92f9-11ed-844e-b1b9f26efb97
+
+
+
diff --git a/graph/incidents_graphml/d/daa953f0-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/daa953f0-0cb8-11ee-9777-83d870147fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72abdcf987cf219f1e06c1a73c6836346de94bef
--- /dev/null
+++ b/graph/incidents_graphml/d/daa953f0-0cb8-11ee-9777-83d870147fdf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.236
+ 100.64.17.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686969857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ daa953f0-0cb8-11ee-9777-83d870147fdf
+
+
+
diff --git a/graph/incidents_graphml/d/daafcde0-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/d/daafcde0-92f9-11ed-844e-b1b9f26efb97.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c596feb0338b399efdf9315c31b0dfb5e80dbe8
--- /dev/null
+++ b/graph/incidents_graphml/d/daafcde0-92f9-11ed-844e-b1b9f26efb97.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1968.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.104
+ 100.64.85.104
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1673583733
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ daafcde0-92f9-11ed-844e-b1b9f26efb97
+
+
+
diff --git a/graph/incidents_graphml/d/dab51e00-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/dab51e00-d3dd-11ee-a6e5-2b3ad02f17a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e92f24d0a37146e892ca26e3f4e7416457b84489
--- /dev/null
+++ b/graph/incidents_graphml/d/dab51e00-d3dd-11ee-a6e5-2b3ad02f17a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.179
+ 100.64.4.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708866030
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dab51e00-d3dd-11ee-a6e5-2b3ad02f17a7
+
+
+
diff --git a/graph/incidents_graphml/d/dacb1310-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/d/dacb1310-bcf3-11ed-9421-6db30872eff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bbe9b24177afc93d547c955cdf350d359b92f583
--- /dev/null
+++ b/graph/incidents_graphml/d/dacb1310-bcf3-11ed-9421-6db30872eff3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.44
+ 100.64.86.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678199105
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dacb1310-bcf3-11ed-9421-6db30872eff3
+
+
+
diff --git a/graph/incidents_graphml/d/dad1bfe0-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/dad1bfe0-1b7b-11ed-8ae2-15a147a6b00c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..584c8eda9b762f92fd532d429b7b8c727b0c9e4c
--- /dev/null
+++ b/graph/incidents_graphml/d/dad1bfe0-1b7b-11ed-8ae2-15a147a6b00c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.27
+ 100.64.79.27
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.181
+ 100.64.75.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660445428
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dad1bfe0-1b7b-11ed-8ae2-15a147a6b00c
+
+
+
diff --git a/graph/incidents_graphml/d/dad8dc80-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dad8dc80-5392-11ee-8b4b-a5c1684d0e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1003ee56074f0a152ae3d2595623e577880ce4b
--- /dev/null
+++ b/graph/incidents_graphml/d/dad8dc80-5392-11ee-8b4b-a5c1684d0e53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.61
+ 100.64.49.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694760069
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dad8dc80-5392-11ee-8b4b-a5c1684d0e53
+
+
+
diff --git a/graph/incidents_graphml/d/dad8fbc0-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/dad8fbc0-3452-11ee-9106-1db75c7cc651.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d145871e77bf5753b467e938a01577d4f75a7bf5
--- /dev/null
+++ b/graph/incidents_graphml/d/dad8fbc0-3452-11ee-9106-1db75c7cc651.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.48
+ 100.64.21.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691324096
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dad8fbc0-3452-11ee-9106-1db75c7cc651
+
+
+
diff --git a/graph/incidents_graphml/d/dad947d0-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/dad947d0-d3dd-11ee-a6e5-2b3ad02f17a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7addf69c6a58085c665306c50fed2ade3250407
--- /dev/null
+++ b/graph/incidents_graphml/d/dad947d0-d3dd-11ee-a6e5-2b3ad02f17a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708866030
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dad947d0-d3dd-11ee-a6e5-2b3ad02f17a7
+
+
+
diff --git a/graph/incidents_graphml/d/dadf83e0-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/d/dadf83e0-3b83-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19ec2e748001afba1fc4b573b18eff4f7388a522
--- /dev/null
+++ b/graph/incidents_graphml/d/dadf83e0-3b83-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.101
+ 100.64.62.101
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692114799
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dadf83e0-3b83-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/d/dae25720-2cea-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/d/dae25720-2cea-11ee-b828-99998b56933c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..473c1e826eb016f1bfac97f8c0fd212b5a925069
--- /dev/null
+++ b/graph/incidents_graphml/d/dae25720-2cea-11ee-b828-99998b56933c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.88
+ 100.64.12.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.235
+ 100.64.71.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690509770
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dae25720-2cea-11ee-b828-99998b56933c
+
+
+ INCIDENT_LINK
+ 1690509770
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dae25720-2cea-11ee-b828-99998b56933c
+
+
+
diff --git a/graph/incidents_graphml/d/dae93030-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dae93030-5392-11ee-8b4b-a5c1684d0e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85cbc0c75f884125400f0321a74a672d82d0dee7
--- /dev/null
+++ b/graph/incidents_graphml/d/dae93030-5392-11ee-8b4b-a5c1684d0e53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.61
+ 100.64.49.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694760069
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dae93030-5392-11ee-8b4b-a5c1684d0e53
+
+
+
diff --git a/graph/incidents_graphml/d/daeb2220-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/daeb2220-d3dd-11ee-a6e5-2b3ad02f17a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00d9bd4a6eab3b27a7c2a04dd41e2a2ae5c6177b
--- /dev/null
+++ b/graph/incidents_graphml/d/daeb2220-d3dd-11ee-a6e5-2b3ad02f17a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708866031
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ daeb2220-d3dd-11ee-a6e5-2b3ad02f17a7
+
+
+
diff --git a/graph/incidents_graphml/d/daef09d0-15b4-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/d/daef09d0-15b4-11ef-8b2e-b54e20f7e466.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ffaa00e2580c98b4c6fb999eb0c75a948a70420
--- /dev/null
+++ b/graph/incidents_graphml/d/daef09d0-15b4-11ef-8b2e-b54e20f7e466.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.206
+ 100.64.6.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ HOST
+ 100.64.95.59
+ 100.64.95.59
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.60
+ 100.64.95.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch","Barracuda WAF"]
+
+
+ HOST
+ 100.64.46.24
+ 100.64.46.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716105198
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ daef09d0-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105198
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ daef09d0-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105198
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ daef09d0-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105198
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ daef09d0-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105198
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ daef09d0-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105198
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ daef09d0-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105198
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ daef09d0-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105198
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ daef09d0-15b4-11ef-8b2e-b54e20f7e466
+
+
+
diff --git a/graph/incidents_graphml/d/dafe8520-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/dafe8520-3452-11ee-9106-1db75c7cc651.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4511e7f866227c92ad8303e59e97019f16555248
--- /dev/null
+++ b/graph/incidents_graphml/d/dafe8520-3452-11ee-9106-1db75c7cc651.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.48
+ 100.64.21.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691324096
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dafe8520-3452-11ee-9106-1db75c7cc651
+
+
+
diff --git a/graph/incidents_graphml/d/db042fe0-0597-11ef-8baf-8702a266b8b0.graphml b/graph/incidents_graphml/d/db042fe0-0597-11ef-8baf-8702a266b8b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bfcc5114a0c6862a90e4a30f036a4f7d5da34bf0
--- /dev/null
+++ b/graph/incidents_graphml/d/db042fe0-0597-11ef-8baf-8702a266b8b0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.42
+ 100.64.92.42
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1714333524
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db042fe0-0597-11ef-8baf-8702a266b8b0
+
+
+
diff --git a/graph/incidents_graphml/d/db062040-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/d/db062040-bcf3-11ed-9421-6db30872eff3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..afcef14443efce9352265352b112ee41e94cee72
--- /dev/null
+++ b/graph/incidents_graphml/d/db062040-bcf3-11ed-9421-6db30872eff3.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.51
+ 100.64.86.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678199105
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ db062040-bcf3-11ed-9421-6db30872eff3
+
+
+ INCIDENT_LINK
+ 1678199105
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ db062040-bcf3-11ed-9421-6db30872eff3
+
+
+
diff --git a/graph/incidents_graphml/d/db066cd0-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/d/db066cd0-3b83-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72ac361a8f8c94b4d50042d73a0dfcc979840cf9
--- /dev/null
+++ b/graph/incidents_graphml/d/db066cd0-3b83-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.101
+ 100.64.62.101
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692114799
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ db066cd0-3b83-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/d/db585700-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/d/db585700-2f46-11ee-8421-f3eff1a35bff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c9910ee6efb11046e860395a7810b1c442d2eb1
--- /dev/null
+++ b/graph/incidents_graphml/d/db585700-2f46-11ee-8421-f3eff1a35bff.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.81
+ 100.64.73.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.68.225
+ 100.64.68.225
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.23.183
+ 100.64.23.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.127
+ 100.64.76.127
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690769187
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ db585700-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769187
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ db585700-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769187
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ db585700-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769187
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ db585700-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769187
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ db585700-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769187
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ db585700-2f46-11ee-8421-f3eff1a35bff
+
+
+
diff --git a/graph/incidents_graphml/d/db7f84a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml b/graph/incidents_graphml/d/db7f84a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d4c17a946ac3897bfb379c8476b1341c41262e2
--- /dev/null
+++ b/graph/incidents_graphml/d/db7f84a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.166
+ 100.64.74.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1680126687
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db7f84a0-ce7b-11ed-9e5b-155bf57fc5c4
+
+
+
diff --git a/graph/incidents_graphml/d/db8466a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml b/graph/incidents_graphml/d/db8466a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e77ae78b6b8d44d6951cc0e7ee0e7a0da3015fc
--- /dev/null
+++ b/graph/incidents_graphml/d/db8466a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.74.166
+ 100.64.74.166
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1680126687
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ db8466a0-ce7b-11ed-9e5b-155bf57fc5c4
+
+
+
diff --git a/graph/incidents_graphml/d/db8694a0-30ec-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/d/db8694a0-30ec-11ef-bae8-75e6361c756f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..510e96208b950016ca0d39449440198ce604b941
--- /dev/null
+++ b/graph/incidents_graphml/d/db8694a0-30ec-11ef-bae8-75e6361c756f.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.40
+ 100.64.53.40
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.170
+ USER-0015-1399.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.41
+ 100.64.53.41
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.42
+ 100.64.53.42
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.43
+ USER-0015-1400.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.61
+ 100.64.49.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.161
+ 100.64.24.161
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.44
+ 100.64.53.44
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719097932
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ db8694a0-30ec-11ef-bae8-75e6361c756f
+
+
+
diff --git a/graph/incidents_graphml/d/db99b0c0-780b-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/d/db99b0c0-780b-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..145a386e15605c2f41d40c1cbd063ee1bc469c12
--- /dev/null
+++ b/graph/incidents_graphml/d/db99b0c0-780b-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,753 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.193
+ 100.64.12.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.162
+ 100.64.19.162
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.163
+ 100.64.19.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.164
+ 100.64.19.164
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.165
+ 100.64.19.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.166
+ 100.64.19.166
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.167
+ 100.64.19.167
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.168
+ 100.64.19.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.169
+ 100.64.19.169
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.170
+ 100.64.19.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.171
+ 100.64.19.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.80
+ 100.64.8.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.172
+ 100.64.19.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.173
+ 100.64.19.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+ INCIDENT_LINK
+ 1698770282
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db99b0c0-780b-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/d/db9b2a60-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/db9b2a60-1b7b-11ed-8ae2-15a147a6b00c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..936f5583311e5472235718e8867ae8888d6ae604
--- /dev/null
+++ b/graph/incidents_graphml/d/db9b2a60-1b7b-11ed-8ae2-15a147a6b00c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.140
+ 100.64.80.140
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660445429
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ db9b2a60-1b7b-11ed-8ae2-15a147a6b00c
+
+
+
diff --git a/graph/incidents_graphml/d/dbad2bc0-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/dbad2bc0-1b7b-11ed-8ae2-15a147a6b00c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b14a9bd77ddbf667b39994a9e3670228034935b9
--- /dev/null
+++ b/graph/incidents_graphml/d/dbad2bc0-1b7b-11ed-8ae2-15a147a6b00c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.140
+ 100.64.80.140
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660445429
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dbad2bc0-1b7b-11ed-8ae2-15a147a6b00c
+
+
+
diff --git a/graph/incidents_graphml/d/dbadc3d0-ed78-11ed-a662-a9c0e7c292a4.graphml b/graph/incidents_graphml/d/dbadc3d0-ed78-11ed-a662-a9c0e7c292a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d8818a2f6c5b90989ead9767d62eda03896a247
--- /dev/null
+++ b/graph/incidents_graphml/d/dbadc3d0-ed78-11ed-a662-a9c0e7c292a4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.186
+ 100.64.68.186
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1683533885
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbadc3d0-ed78-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683533885
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbadc3d0-ed78-11ed-a662-a9c0e7c292a4
+
+
+
diff --git a/graph/incidents_graphml/d/dbba2410-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/dbba2410-1b7b-11ed-8ae2-15a147a6b00c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5493a4fc3adc815147e39e161998a10bc0fd72e0
--- /dev/null
+++ b/graph/incidents_graphml/d/dbba2410-1b7b-11ed-8ae2-15a147a6b00c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.37
+ 100.64.1.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.7.197
+ 100.64.7.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660445429
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ dbba2410-1b7b-11ed-8ae2-15a147a6b00c
+
+
+ INCIDENT_LINK
+ 1660445429
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ dbba2410-1b7b-11ed-8ae2-15a147a6b00c
+
+
+
diff --git a/graph/incidents_graphml/d/dbbc80d0-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/d/dbbc80d0-138b-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d2fbf6a248592018d02234c280d0ab0d7e12a7b
--- /dev/null
+++ b/graph/incidents_graphml/d/dbbc80d0-138b-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.85
+ 100.64.74.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.58
+ 100.64.73.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687720190
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbbc80d0-138b-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687720190
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbbc80d0-138b-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/d/dbbf0610-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/dbbf0610-1b7b-11ed-8ae2-15a147a6b00c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8150501215fe7515c1d16543dd02baf12cc6b81
--- /dev/null
+++ b/graph/incidents_graphml/d/dbbf0610-1b7b-11ed-8ae2-15a147a6b00c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.51
+ 100.64.72.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.13.216
+ 100.64.13.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660445430
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dbbf0610-1b7b-11ed-8ae2-15a147a6b00c
+
+
+
diff --git a/graph/incidents_graphml/d/dbc23380-076a-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/d/dbc23380-076a-11ef-93a8-d78cfa287885.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7e76b12c7084d7ae4ac8c9bf7b17250fccebf2e
--- /dev/null
+++ b/graph/incidents_graphml/d/dbc23380-076a-11ef-93a8-d78cfa287885.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.179.188
+ 172.29.179.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.9
+ 100.64.94.9
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714534100
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbc23380-076a-11ef-93a8-d78cfa287885
+
+
+ INCIDENT_LINK
+ 1714534100
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbc23380-076a-11ef-93a8-d78cfa287885
+
+
+
diff --git a/graph/incidents_graphml/d/dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf.graphml b/graph/incidents_graphml/d/dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5372cc2abcfbebf57451e15414f7495b34de689
--- /dev/null
+++ b/graph/incidents_graphml/d/dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.69
+ 100.64.62.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.205
+ 100.64.62.205
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.62
+ 100.64.22.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.193
+ 100.64.12.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.10
+ 100.64.37.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.61
+ 100.64.28.61
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.81
+ 100.64.47.81
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.206
+ 100.64.62.206
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.243
+ 100.64.30.243
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.207
+ 100.64.62.207
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.208
+ 100.64.62.208
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.212
+ 100.64.54.212
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.209
+ 100.64.62.209
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.89
+ 100.64.26.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.210
+ 100.64.62.210
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.150
+ 100.64.15.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.211
+ 100.64.62.211
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+ INCIDENT_LINK
+ 1691593821
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf
+
+
+
diff --git a/graph/incidents_graphml/d/dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/d/dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64158a6534aa66faee8aaa407dc198efebc8a35c
--- /dev/null
+++ b/graph/incidents_graphml/d/dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.243
+ 100.64.18.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.35.79
+ 100.64.35.79
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.80
+ 100.64.35.80
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.81
+ 100.64.35.81
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.35.82
+ 100.64.35.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.50
+ 100.64.9.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.191
+ 100.64.27.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.22.7
+ 100.64.22.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150082
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294
+
+
+
diff --git a/graph/incidents_graphml/d/dbe61090-fb1b-11ed-895b-69b7bcd870e2.graphml b/graph/incidents_graphml/d/dbe61090-fb1b-11ed-895b-69b7bcd870e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d88b983805b4ac9c042e56a6d9c5430368df79a
--- /dev/null
+++ b/graph/incidents_graphml/d/dbe61090-fb1b-11ed-895b-69b7bcd870e2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.104
+ 100.64.51.104
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685033259
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dbe61090-fb1b-11ed-895b-69b7bcd870e2
+
+
+
diff --git a/graph/incidents_graphml/d/dc035c90-fb1b-11ed-895b-69b7bcd870e2.graphml b/graph/incidents_graphml/d/dc035c90-fb1b-11ed-895b-69b7bcd870e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11e2e8e0681d21b6cf67b307c7c0c70fda108efb
--- /dev/null
+++ b/graph/incidents_graphml/d/dc035c90-fb1b-11ed-895b-69b7bcd870e2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.51.104
+ 100.64.51.104
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685033259
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dc035c90-fb1b-11ed-895b-69b7bcd870e2
+
+
+
diff --git a/graph/incidents_graphml/d/dc1e7390-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/dc1e7390-295b-11ee-af70-f9ca9a13f131.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5406cbcbeacf8da4d5ac08999b5a9d8082b877e
--- /dev/null
+++ b/graph/incidents_graphml/d/dc1e7390-295b-11ee-af70-f9ca9a13f131.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.101
+ 100.64.50.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690118500
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dc1e7390-295b-11ee-af70-f9ca9a13f131
+
+
+
diff --git a/graph/incidents_graphml/d/dc2896d0-1601-11ee-b5b0-23eb7b8b596d.graphml b/graph/incidents_graphml/d/dc2896d0-1601-11ee-b5b0-23eb7b8b596d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11880a7a7166a2a91f5c973a7160013668ab0b70
--- /dev/null
+++ b/graph/incidents_graphml/d/dc2896d0-1601-11ee-b5b0-23eb7b8b596d.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.218
+ USER-0015-1275.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.157
+ 100.64.59.157
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.158
+ 100.64.59.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687990774
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc2896d0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990774
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc2896d0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990774
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc2896d0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990774
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc2896d0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990774
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc2896d0-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990774
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc2896d0-1601-11ee-b5b0-23eb7b8b596d
+
+
+
diff --git a/graph/incidents_graphml/d/dc414680-fe69-11ed-a136-877286d930e4.graphml b/graph/incidents_graphml/d/dc414680-fe69-11ed-a136-877286d930e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f2ce13f577c506b9cd920308f57db12cd32a91d4
--- /dev/null
+++ b/graph/incidents_graphml/d/dc414680-fe69-11ed-a136-877286d930e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.105
+ 100.64.7.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685396614
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc414680-fe69-11ed-a136-877286d930e4
+
+
+
diff --git a/graph/incidents_graphml/d/dc559b40-fb1b-11ed-895b-69b7bcd870e2.graphml b/graph/incidents_graphml/d/dc559b40-fb1b-11ed-895b-69b7bcd870e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa5eb0de92198cb7574fda1b034c86b13b421bed
--- /dev/null
+++ b/graph/incidents_graphml/d/dc559b40-fb1b-11ed-895b-69b7bcd870e2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.105
+ 100.64.36.105
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685033259
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dc559b40-fb1b-11ed-895b-69b7bcd870e2
+
+
+
diff --git a/graph/incidents_graphml/d/dc5ba080-8559-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/d/dc5ba080-8559-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9cf0cf56ce618a5f7ce62095437cf5ca6b9dc47
--- /dev/null
+++ b/graph/incidents_graphml/d/dc5ba080-8559-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.103
+ 100.64.31.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dc5ba080-8559-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/d/dc6f76a0-8559-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/d/dc6f76a0-8559-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1ed7e9781884428524233e291ba892da82e6095
--- /dev/null
+++ b/graph/incidents_graphml/d/dc6f76a0-8559-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.103
+ 100.64.31.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dc6f76a0-8559-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/d/dc820300-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/d/dc820300-13f4-11ee-9bb8-6b8312f57fd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3af57f044ed877f22ae57170917223af03f3622b
--- /dev/null
+++ b/graph/incidents_graphml/d/dc820300-13f4-11ee-9bb8-6b8312f57fd1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.226
+ 100.64.72.226
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.196
+ 100.64.72.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687765288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dc820300-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dc820300-13f4-11ee-9bb8-6b8312f57fd1
+
+
+
diff --git a/graph/incidents_graphml/d/dc821440-8559-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/d/dc821440-8559-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f21f41bde672e4b02d9cc491cd715f7c2726de4c
--- /dev/null
+++ b/graph/incidents_graphml/d/dc821440-8559-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.105
+ 100.64.31.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.106
+ 100.64.31.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.107
+ 100.64.31.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.108
+ 100.64.31.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.109
+ 100.64.31.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.124
+ 100.64.25.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.51
+ 100.64.19.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.110
+ 100.64.31.110
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.111
+ 100.64.31.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.112
+ 100.64.31.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.87
+ 100.64.31.87
+ []
+ 0.578125
+ ["Precinct"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.233
+ 100.64.20.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.113
+ 100.64.31.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.114
+ 100.64.31.114
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.50
+ 100.64.9.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.115
+ 100.64.31.115
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.116
+ 100.64.31.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.117
+ 100.64.31.117
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.234
+ 100.64.9.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700233149
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc821440-8559-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/d/dc8d8780-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/dc8d8780-d3dd-11ee-a6e5-2b3ad02f17a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5ba633c664ff7e6cdc845c204b3e73a5616f4ae
--- /dev/null
+++ b/graph/incidents_graphml/d/dc8d8780-d3dd-11ee-a6e5-2b3ad02f17a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.162
+ 100.64.40.162
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708866033
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc8d8780-d3dd-11ee-a6e5-2b3ad02f17a7
+
+
+
diff --git a/graph/incidents_graphml/d/dc9711a0-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/d/dc9711a0-13f4-11ee-9bb8-6b8312f57fd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81e7fedc8e575085727dbd273d61e9ff6146cfef
--- /dev/null
+++ b/graph/incidents_graphml/d/dc9711a0-13f4-11ee-9bb8-6b8312f57fd1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.227
+ 100.64.72.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.41
+ 100.64.72.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687765288
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc9711a0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765288
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dc9711a0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+
diff --git a/graph/incidents_graphml/d/dca06760-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/d/dca06760-2f46-11ee-8421-f3eff1a35bff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..460e079c25ebc1617f16ec53d800d84f915109d2
--- /dev/null
+++ b/graph/incidents_graphml/d/dca06760-2f46-11ee-8421-f3eff1a35bff.graphml
@@ -0,0 +1,459 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.7
+ 100.64.22.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.14.83
+ 100.64.14.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.19.247
+ USER-0015-1735.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.25.188
+ 100.64.25.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.128
+ 100.64.76.128
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.130
+ 100.64.72.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.12.246
+ 100.64.12.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.5
+ 100.64.74.5
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.13.133
+ 100.64.13.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.12.60
+ 100.64.12.60
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769189
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca06760-2f46-11ee-8421-f3eff1a35bff
+
+
+
diff --git a/graph/incidents_graphml/d/dca272c0-0859-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/d/dca272c0-0859-11ef-81c9-bbab78bb4e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa889ea7ff8e4e401bbef251f2f8644a73071ef2
--- /dev/null
+++ b/graph/incidents_graphml/d/dca272c0-0859-11ef-81c9-bbab78bb4e36.graphml
@@ -0,0 +1,241 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.185
+ 100.64.97.185
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 172.16.46.208
+ 172.16.46.208
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.186
+ 100.64.97.186
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.187
+ USER-0015-2174.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca272c0-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca272c0-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca272c0-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca272c0-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca272c0-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca272c0-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca272c0-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca272c0-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca272c0-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca272c0-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca272c0-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca272c0-0859-11ef-81c9-bbab78bb4e36
+
+
+
diff --git a/graph/incidents_graphml/d/dca5b060-efe8-11ec-a293-5b334d10f0f6.graphml b/graph/incidents_graphml/d/dca5b060-efe8-11ec-a293-5b334d10f0f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5258f9f7d131339998313e7936e043fda9aef523
--- /dev/null
+++ b/graph/incidents_graphml/d/dca5b060-efe8-11ec-a293-5b334d10f0f6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.194
+ 100.64.81.194
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.250
+ 100.64.70.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655654395
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca5b060-efe8-11ec-a293-5b334d10f0f6
+
+
+ INCIDENT_LINK
+ 1655654395
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dca5b060-efe8-11ec-a293-5b334d10f0f6
+
+
+
diff --git a/graph/incidents_graphml/d/dcbe8f90-efe8-11ec-a293-5b334d10f0f6.graphml b/graph/incidents_graphml/d/dcbe8f90-efe8-11ec-a293-5b334d10f0f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a67bd402c0ce5ab483fb3438dbe5481547c678b5
--- /dev/null
+++ b/graph/incidents_graphml/d/dcbe8f90-efe8-11ec-a293-5b334d10f0f6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.195
+ 100.64.81.195
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.77
+ 100.64.72.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655654395
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dcbe8f90-efe8-11ec-a293-5b334d10f0f6
+
+
+ INCIDENT_LINK
+ 1655654395
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dcbe8f90-efe8-11ec-a293-5b334d10f0f6
+
+
+
diff --git a/graph/incidents_graphml/d/dcc33840-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/dcc33840-6e29-11ee-b3d5-39e2e796f8b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a6a6db131bd0afaba3ac392622b65b934cb3074
--- /dev/null
+++ b/graph/incidents_graphml/d/dcc33840-6e29-11ee-b3d5-39e2e796f8b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.64
+ 100.64.9.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697683657
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dcc33840-6e29-11ee-b3d5-39e2e796f8b3
+
+
+
diff --git a/graph/incidents_graphml/d/dcd27a80-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/dcd27a80-6e29-11ee-b3d5-39e2e796f8b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a0224efa5b7103d423fa09548841aaad9f32e09
--- /dev/null
+++ b/graph/incidents_graphml/d/dcd27a80-6e29-11ee-b3d5-39e2e796f8b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.64
+ 100.64.9.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697683657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dcd27a80-6e29-11ee-b3d5-39e2e796f8b3
+
+
+
diff --git a/graph/incidents_graphml/d/dcde7860-1c9b-11ee-baac-abb351177483.graphml b/graph/incidents_graphml/d/dcde7860-1c9b-11ee-baac-abb351177483.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eca35af34c4328e98a11305a132f2c0ced1e3e82
--- /dev/null
+++ b/graph/incidents_graphml/d/dcde7860-1c9b-11ee-baac-abb351177483.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.162
+ 100.64.9.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688716624
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dcde7860-1c9b-11ee-baac-abb351177483
+
+
+
diff --git a/graph/incidents_graphml/d/dce0f970-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/dce0f970-6e29-11ee-b3d5-39e2e796f8b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e211b192f4d16987ab3954a3516f6dc688f0dc2
--- /dev/null
+++ b/graph/incidents_graphml/d/dce0f970-6e29-11ee-b3d5-39e2e796f8b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.202
+ 100.64.51.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697683657
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dce0f970-6e29-11ee-b3d5-39e2e796f8b3
+
+
+
diff --git a/graph/incidents_graphml/d/dce8eea0-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/dce8eea0-9562-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..799faa330de8fdcfd03b38af64ecca3343cf24a5
--- /dev/null
+++ b/graph/incidents_graphml/d/dce8eea0-9562-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.166
+ 100.64.78.166
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.255
+ 100.64.75.255
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.78.167
+ 100.64.78.167
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1673848736
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dce8eea0-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848736
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dce8eea0-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848736
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dce8eea0-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848736
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dce8eea0-9562-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/d/dceac360-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/dceac360-9562-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3fd0e67358423fb05a3616ddec744e4a15b1a3b5
--- /dev/null
+++ b/graph/incidents_graphml/d/dceac360-9562-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.168
+ 100.64.78.168
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.181
+ 100.64.75.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.78.169
+ 100.64.78.169
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1673848736
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dceac360-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848736
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dceac360-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848736
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dceac360-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848736
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dceac360-9562-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/d/dceb53f0-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/dceb53f0-57d3-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7278a6bd365fcec1c60def3c5be6e7236c16eb3
--- /dev/null
+++ b/graph/incidents_graphml/d/dceb53f0-57d3-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.22
+ 100.64.61.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695227795
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dceb53f0-57d3-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/d/dcef0330-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/dcef0330-6e29-11ee-b3d5-39e2e796f8b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb4ffedad2e3ede873e3a00359cfee5f5bf6b9a4
--- /dev/null
+++ b/graph/incidents_graphml/d/dcef0330-6e29-11ee-b3d5-39e2e796f8b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.202
+ 100.64.51.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697683657
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dcef0330-6e29-11ee-b3d5-39e2e796f8b3
+
+
+
diff --git a/graph/incidents_graphml/d/dcf00470-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/d/dcf00470-5b2c-11ee-a5b1-e563b721d2c6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50623df692a6a82c55dccbfe80f82aaa3e2d9d9c
--- /dev/null
+++ b/graph/incidents_graphml/d/dcf00470-5b2c-11ee-a5b1-e563b721d2c6.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.169
+ 100.64.68.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"]
+
+
+ HOST
+ 100.64.68.170
+ 100.64.68.170
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.171
+ 100.64.68.171
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.172
+ 100.64.68.172
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695595873
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dcf00470-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595873
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dcf00470-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595873
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dcf00470-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595873
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dcf00470-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595873
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dcf00470-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595873
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dcf00470-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595873
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dcf00470-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595873
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dcf00470-5b2c-11ee-a5b1-e563b721d2c6
+
+
+
diff --git a/graph/incidents_graphml/d/dcf2a4d0-f770-11ec-b122-cb097d636325.graphml b/graph/incidents_graphml/d/dcf2a4d0-f770-11ec-b122-cb097d636325.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30264b541179d64411d7c5e28f668778113c185f
--- /dev/null
+++ b/graph/incidents_graphml/d/dcf2a4d0-f770-11ec-b122-cb097d636325.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.2
+ 100.64.17.2
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.166
+ USER-0015-1615.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656482465
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dcf2a4d0-f770-11ec-b122-cb097d636325
+
+
+ INCIDENT_LINK
+ 1656482465
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dcf2a4d0-f770-11ec-b122-cb097d636325
+
+
+
diff --git a/graph/incidents_graphml/d/dcf2dcb0-0859-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/d/dcf2dcb0-0859-11ef-81c9-bbab78bb4e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d2100d2647e787c446b8ce1a8f73c223c611e07
--- /dev/null
+++ b/graph/incidents_graphml/d/dcf2dcb0-0859-11ef-81c9-bbab78bb4e36.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.179.188
+ 172.29.179.188
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.13
+ 100.64.89.13
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dcf2dcb0-0859-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636752
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dcf2dcb0-0859-11ef-81c9-bbab78bb4e36
+
+
+
diff --git a/graph/incidents_graphml/d/dcf82530-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/dcf82530-57d3-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ff15a8caeb4ab512844da355b7fa40af7ae6673
--- /dev/null
+++ b/graph/incidents_graphml/d/dcf82530-57d3-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.22
+ 100.64.61.22
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695227795
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dcf82530-57d3-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/d/dcfefde0-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/dcfefde0-7bc0-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ebf1b727377365a783f46176135f57bb0f950c0
--- /dev/null
+++ b/graph/incidents_graphml/d/dcfefde0-7bc0-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.139
+ 100.64.26.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699177876
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dcfefde0-7bc0-11ee-bf1f-2f975ac76263
+
+
+ INCIDENT_LINK
+ 1699177876
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dcfefde0-7bc0-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/d/dd040c10-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/dd040c10-57d3-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d739bfb8529e5de48d405108c4b24837723095b8
--- /dev/null
+++ b/graph/incidents_graphml/d/dd040c10-57d3-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.242
+ 100.64.12.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695227795
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dd040c10-57d3-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/d/dd0691f0-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dd0691f0-5392-11ee-8b4b-a5c1684d0e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2ac874a35a129ead95a61fbd589fbae0683eb19
--- /dev/null
+++ b/graph/incidents_graphml/d/dd0691f0-5392-11ee-8b4b-a5c1684d0e53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.63
+ 100.64.49.63
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694760073
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dd0691f0-5392-11ee-8b4b-a5c1684d0e53
+
+
+
diff --git a/graph/incidents_graphml/d/dd117990-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/dd117990-57d3-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77f6f2fee39f49f748dfe1704ed9c33566eb07fa
--- /dev/null
+++ b/graph/incidents_graphml/d/dd117990-57d3-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.242
+ 100.64.12.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695227795
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ dd117990-57d3-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/d/dd140c80-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/dd140c80-7bc0-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e851547523211829d9ad8b93df16e810b7adda2
--- /dev/null
+++ b/graph/incidents_graphml/d/dd140c80-7bc0-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.139
+ 100.64.26.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699177876
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ dd140c80-7bc0-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/d/dd16be90-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dd16be90-5392-11ee-8b4b-a5c1684d0e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15ebb106a392413575759c6ed71d4a1b68c6456d
--- /dev/null
+++ b/graph/incidents_graphml/d/dd16be90-5392-11ee-8b4b-a5c1684d0e53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.63
+ 100.64.49.63
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694760073
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dd16be90-5392-11ee-8b4b-a5c1684d0e53
+
+
+
diff --git a/graph/incidents_graphml/d/dd1a19f0-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/dd1a19f0-b752-11ed-808d-57d97cd084e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..596abad4e6442b7ddae34ef4d086b467768637ea
--- /dev/null
+++ b/graph/incidents_graphml/d/dd1a19f0-b752-11ed-808d-57d97cd084e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.141
+ 100.64.92.141
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1677580204
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dd1a19f0-b752-11ed-808d-57d97cd084e1
+
+
+
diff --git a/graph/incidents_graphml/d/dd247a30-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dd247a30-5392-11ee-8b4b-a5c1684d0e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..37250101b64a3e8566726bdbcf5606032dfc87e5
--- /dev/null
+++ b/graph/incidents_graphml/d/dd247a30-5392-11ee-8b4b-a5c1684d0e53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.153
+ 100.64.30.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694760073
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dd247a30-5392-11ee-8b4b-a5c1684d0e53
+
+
+
diff --git a/graph/incidents_graphml/d/dd27ae80-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/dd27ae80-b752-11ed-808d-57d97cd084e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a015c46b6b77912e62cb26f9ee7570243b83e02
--- /dev/null
+++ b/graph/incidents_graphml/d/dd27ae80-b752-11ed-808d-57d97cd084e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.141
+ 100.64.92.141
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677580204
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd27ae80-b752-11ed-808d-57d97cd084e1
+
+
+
diff --git a/graph/incidents_graphml/d/dd2a6da0-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/dd2a6da0-b752-11ed-808d-57d97cd084e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da6ea67d8a62df39d44a4048cd55583e3ca7ec8c
--- /dev/null
+++ b/graph/incidents_graphml/d/dd2a6da0-b752-11ed-808d-57d97cd084e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.143
+ 100.64.92.143
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677580204
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dd2a6da0-b752-11ed-808d-57d97cd084e1
+
+
+
diff --git a/graph/incidents_graphml/d/dd2fab00-15b4-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/d/dd2fab00-15b4-11ef-8b2e-b54e20f7e466.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d100a6663b2cf964e455b8cd087f68b4611ac842
--- /dev/null
+++ b/graph/incidents_graphml/d/dd2fab00-15b4-11ef-8b2e-b54e20f7e466.graphml
@@ -0,0 +1,437 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.16
+ 100.64.60.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.95.63
+ 100.64.95.63
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.220
+ 100.64.4.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.64
+ 100.64.95.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.165
+ 100.64.10.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.135
+ 100.64.50.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.65
+ USER-0015-2125.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.66
+ 100.64.95.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.120
+ 100.64.64.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.67
+ USER-0015-2126.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.11
+ 100.64.33.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105202
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd2fab00-15b4-11ef-8b2e-b54e20f7e466
+
+
+
diff --git a/graph/incidents_graphml/d/dd3696f0-1a8c-11ee-a9ef-735ae64b5bd4.graphml b/graph/incidents_graphml/d/dd3696f0-1a8c-11ee-a9ef-735ae64b5bd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..130156ca0001901b6e8ed5777b78968a03613209
--- /dev/null
+++ b/graph/incidents_graphml/d/dd3696f0-1a8c-11ee-a9ef-735ae64b5bd4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.4
+ 100.64.72.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688490280
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd3696f0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490280
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dd3696f0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+
diff --git a/graph/incidents_graphml/d/dd371500-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/d/dd371500-92f9-11ed-844e-b1b9f26efb97.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4de3e218f328aa99643179064fae0c09c4ea74fb
--- /dev/null
+++ b/graph/incidents_graphml/d/dd371500-92f9-11ed-844e-b1b9f26efb97.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1968.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1673583737
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dd371500-92f9-11ed-844e-b1b9f26efb97
+
+
+
diff --git a/graph/incidents_graphml/d/dd393ab0-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dd393ab0-5392-11ee-8b4b-a5c1684d0e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86de0cafc3a6b93558181520aacd1a46ccfc5d21
--- /dev/null
+++ b/graph/incidents_graphml/d/dd393ab0-5392-11ee-8b4b-a5c1684d0e53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.153
+ 100.64.30.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694760073
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ dd393ab0-5392-11ee-8b4b-a5c1684d0e53
+
+
+
diff --git a/graph/incidents_graphml/d/dd3c9340-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/d/dd3c9340-92f9-11ed-844e-b1b9f26efb97.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..84d4412cd0081f83c909e4864219da6a4f3422b6
--- /dev/null
+++ b/graph/incidents_graphml/d/dd3c9340-92f9-11ed-844e-b1b9f26efb97.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1968.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1673583737
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dd3c9340-92f9-11ed-844e-b1b9f26efb97
+
+
+
diff --git a/graph/incidents_graphml/d/dd474470-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dd474470-5392-11ee-8b4b-a5c1684d0e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c463d41a6d9ff11670e9c66ce0909a3799866c2
--- /dev/null
+++ b/graph/incidents_graphml/d/dd474470-5392-11ee-8b4b-a5c1684d0e53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.65
+ 100.64.49.65
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694760073
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dd474470-5392-11ee-8b4b-a5c1684d0e53
+
+
+
diff --git a/graph/incidents_graphml/d/dd500410-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/dd500410-7bc0-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a103b19ab67eaf348983b25e04826400170fbdc
--- /dev/null
+++ b/graph/incidents_graphml/d/dd500410-7bc0-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 192.0.2.182
+ 192.0.2.182
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699177877
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dd500410-7bc0-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/d/dd577110-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dd577110-5392-11ee-8b4b-a5c1684d0e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..01516e186540f612fc9053fe6d9441f5a8a8f292
--- /dev/null
+++ b/graph/incidents_graphml/d/dd577110-5392-11ee-8b4b-a5c1684d0e53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.65
+ 100.64.49.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694760073
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dd577110-5392-11ee-8b4b-a5c1684d0e53
+
+
+
diff --git a/graph/incidents_graphml/d/dd751340-dd9f-11ee-b481-81f382d6ce1b.graphml b/graph/incidents_graphml/d/dd751340-dd9f-11ee-b481-81f382d6ce1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0954ca6a804f3bfba0b8f8bc3aea08dbb4035eae
--- /dev/null
+++ b/graph/incidents_graphml/d/dd751340-dd9f-11ee-b481-81f382d6ce1b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.60
+ 100.64.31.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709938918
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dd751340-dd9f-11ee-b481-81f382d6ce1b
+
+
+
diff --git a/graph/incidents_graphml/d/dd753f50-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/dd753f50-7bc0-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87b6786a48b71c61a27bfcdbfd82c7f3c2444f5a
--- /dev/null
+++ b/graph/incidents_graphml/d/dd753f50-7bc0-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.46
+ 100.64.67.46
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699177877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ dd753f50-7bc0-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/d/dd7a33f0-533c-11ed-82ec-e7a72760a0c9.graphml b/graph/incidents_graphml/d/dd7a33f0-533c-11ed-82ec-e7a72760a0c9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c395e8fd157c1ff0f51931bce6e98c92868e96a
--- /dev/null
+++ b/graph/incidents_graphml/d/dd7a33f0-533c-11ed-82ec-e7a72760a0c9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.57
+ 100.64.95.57
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1666575639
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dd7a33f0-533c-11ed-82ec-e7a72760a0c9
+
+
+
diff --git a/graph/incidents_graphml/d/dd93c2d0-f0fb-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/d/dd93c2d0-f0fb-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..524873560bb92fbb3d60e3a5a62d43d4047f7353
--- /dev/null
+++ b/graph/incidents_graphml/d/dd93c2d0-f0fb-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.168
+ 100.64.25.168
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712067504
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dd93c2d0-f0fb-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/d/ddb028a0-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/d/ddb028a0-2da4-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..252491325c589798a455a070e339a0c4146c9d49
--- /dev/null
+++ b/graph/incidents_graphml/d/ddb028a0-2da4-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.169
+ 100.64.37.169
+ ["Exploiting Host"]
+ 0.7525
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690589661
+ malicious
+ 0.7525
+ 0.7525
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ddb028a0-2da4-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/d/ddb407b0-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/ddb407b0-295b-11ee-af70-f9ca9a13f131.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd32453ca47066b08245f8552220396a8606e0c6
--- /dev/null
+++ b/graph/incidents_graphml/d/ddb407b0-295b-11ee-af70-f9ca9a13f131.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.104
+ 100.64.6.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690118503
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ddb407b0-295b-11ee-af70-f9ca9a13f131
+
+
+
diff --git a/graph/incidents_graphml/d/ddb72360-eb97-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/d/ddb72360-eb97-11ee-8f3a-6b2412cfa52f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..122f17fa356d450e68f3754bc940531fae9436a8
--- /dev/null
+++ b/graph/incidents_graphml/d/ddb72360-eb97-11ee-8f3a-6b2412cfa52f.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.161
+ 100.64.23.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.70.24
+ 100.64.70.24
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711474798
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ddb72360-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474798
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ddb72360-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474798
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ddb72360-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474798
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ddb72360-eb97-11ee-8f3a-6b2412cfa52f
+
+
+
diff --git a/graph/incidents_graphml/d/ddb814b0-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/ddb814b0-7bc0-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1aaebd2dd437bb1335754737f095b91615f0248
--- /dev/null
+++ b/graph/incidents_graphml/d/ddb814b0-7bc0-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.48
+ 100.64.67.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699177877
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ddb814b0-7bc0-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/d/ddc45c20-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/d/ddc45c20-9773-11ed-8e25-218966643970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e04e19492c4d95ea19863ee37091ae85f079fee
--- /dev/null
+++ b/graph/incidents_graphml/d/ddc45c20-9773-11ed-8e25-218966643970.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.254
+ 100.64.81.254
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.60
+ 100.64.73.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1674075941
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ddc45c20-9773-11ed-8e25-218966643970
+
+
+ INCIDENT_LINK
+ 1674075941
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ddc45c20-9773-11ed-8e25-218966643970
+
+
+
diff --git a/graph/incidents_graphml/d/ddc9d9a0-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/ddc9d9a0-295b-11ee-af70-f9ca9a13f131.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7329af2db8732e62168181961b6905e470413f8f
--- /dev/null
+++ b/graph/incidents_graphml/d/ddc9d9a0-295b-11ee-af70-f9ca9a13f131.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.104
+ 100.64.6.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690118503
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ddc9d9a0-295b-11ee-af70-f9ca9a13f131
+
+
+
diff --git a/graph/incidents_graphml/d/ddcb2780-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/ddcb2780-7bc0-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd3f44e5cf7560c4c6f0e6bcc74810a898463ee9
--- /dev/null
+++ b/graph/incidents_graphml/d/ddcb2780-7bc0-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.48
+ 100.64.67.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699177878
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ddcb2780-7bc0-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/d/ddd6c370-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/d/ddd6c370-2da4-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..881887ee95bcb65f67a14e1a24781811fe160f8d
--- /dev/null
+++ b/graph/incidents_graphml/d/ddd6c370-2da4-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.169
+ 100.64.37.169
+ ["Exploiting Host"]
+ 0.7525
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690589661
+ malicious
+ 0.7525
+ 0.7525
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ddd6c370-2da4-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/d/ddda5460-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/ddda5460-295b-11ee-af70-f9ca9a13f131.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eee1b9a308d89b372e8c4fff05f182bffe3ac4ac
--- /dev/null
+++ b/graph/incidents_graphml/d/ddda5460-295b-11ee-af70-f9ca9a13f131.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.216
+ USER-0015-1480.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690118503
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ddda5460-295b-11ee-af70-f9ca9a13f131
+
+
+
diff --git a/graph/incidents_graphml/d/dddc9740-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/d/dddc9740-3b83-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab745a7b5126c6ea6c498c3714d0ee7fc68c3aaa
--- /dev/null
+++ b/graph/incidents_graphml/d/dddc9740-3b83-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.195
+ 100.64.6.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692114804
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dddc9740-3b83-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/d/dddce950-8559-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/d/dddce950-8559-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..079863f23473828706224fa722c5bfb37de7a6d3
--- /dev/null
+++ b/graph/incidents_graphml/d/dddce950-8559-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.135
+ 100.64.31.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700233151
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dddce950-8559-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/d/dde0fe90-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/dde0fe90-57d3-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3cc11d5d98419f8d749b69bdcd31dacb1a820b8
--- /dev/null
+++ b/graph/incidents_graphml/d/dde0fe90-57d3-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.217
+ 100.64.24.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695227796
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dde0fe90-57d3-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/d/dde224e0-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dde224e0-5392-11ee-8b4b-a5c1684d0e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17ce6127d1d1205b4ca3c5ef1c770ee16d103d57
--- /dev/null
+++ b/graph/incidents_graphml/d/dde224e0-5392-11ee-8b4b-a5c1684d0e53.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.83
+ 100.64.11.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694760074
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dde224e0-5392-11ee-8b4b-a5c1684d0e53
+
+
+
diff --git a/graph/incidents_graphml/d/ddef1560-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/ddef1560-3452-11ee-9106-1db75c7cc651.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e1c64856d1a081741f59d94778aa449efdc15ca
--- /dev/null
+++ b/graph/incidents_graphml/d/ddef1560-3452-11ee-9106-1db75c7cc651.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.213
+ 100.64.28.213
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691324101
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ddef1560-3452-11ee-9106-1db75c7cc651
+
+
+
diff --git a/graph/incidents_graphml/d/ddf27040-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/ddf27040-295b-11ee-af70-f9ca9a13f131.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..379e7dfbfbcc3b882d65353f773287e2df9588f8
--- /dev/null
+++ b/graph/incidents_graphml/d/ddf27040-295b-11ee-af70-f9ca9a13f131.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.216
+ USER-0015-1480.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690118503
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ddf27040-295b-11ee-af70-f9ca9a13f131
+
+
+
diff --git a/graph/incidents_graphml/d/ddf66ca0-9c29-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/d/ddf66ca0-9c29-11ed-a223-eb3483e385f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7eb6b4ea825e3061269089978066c0dca7b46bf4
--- /dev/null
+++ b/graph/incidents_graphml/d/ddf66ca0-9c29-11ed-a223-eb3483e385f1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.28
+ 100.64.1.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.131
+ 100.64.72.131
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1674593914
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ ddf66ca0-9c29-11ed-a223-eb3483e385f1
+
+
+
diff --git a/graph/incidents_graphml/d/ddfd65b0-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/d/ddfd65b0-3b83-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df10195892b3157f69398eb60f3ab50f8f43d47b
--- /dev/null
+++ b/graph/incidents_graphml/d/ddfd65b0-3b83-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.195
+ 100.64.6.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692114804
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ddfd65b0-3b83-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/d/de002ff0-fe91-11ec-809e-b1a45fa3fffe.graphml b/graph/incidents_graphml/d/de002ff0-fe91-11ec-809e-b1a45fa3fffe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24b7b3efdf9f12beb3206dc8e85f838ed88fe162
--- /dev/null
+++ b/graph/incidents_graphml/d/de002ff0-fe91-11ec-809e-b1a45fa3fffe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.16
+ USER-0015-1610.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657266298
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de002ff0-fe91-11ec-809e-b1a45fa3fffe
+
+
+
diff --git a/graph/incidents_graphml/d/de05d130-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/de05d130-295b-11ee-af70-f9ca9a13f131.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c1532177fcb11a917bd2d52a3ef5f019dc9da04
--- /dev/null
+++ b/graph/incidents_graphml/d/de05d130-295b-11ee-af70-f9ca9a13f131.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.35
+ 100.64.4.35
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690118503
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de05d130-295b-11ee-af70-f9ca9a13f131
+
+
+
diff --git a/graph/incidents_graphml/d/de19f570-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/de19f570-295b-11ee-af70-f9ca9a13f131.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5261cbfa9c6ba54668cf65f05d151ba79469df6c
--- /dev/null
+++ b/graph/incidents_graphml/d/de19f570-295b-11ee-af70-f9ca9a13f131.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.35
+ 100.64.4.35
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690118504
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de19f570-295b-11ee-af70-f9ca9a13f131
+
+
+
diff --git a/graph/incidents_graphml/d/de1f7c80-1815-11ef-a290-d5e92fd7ebc0.graphml b/graph/incidents_graphml/d/de1f7c80-1815-11ef-a290-d5e92fd7ebc0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78169c48e4536a5e9ece6f62dc666ad755ffe2a8
--- /dev/null
+++ b/graph/incidents_graphml/d/de1f7c80-1815-11ef-a290-d5e92fd7ebc0.graphml
@@ -0,0 +1,437 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.141
+ 100.64.87.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.42.148
+ 100.64.42.148
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.1
+ 100.64.27.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.142
+ 100.64.87.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.143
+ 100.64.87.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.5
+ 100.64.53.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.41.224
+ 100.64.41.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.19.41
+ 100.64.19.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.18.80
+ 100.64.18.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.29.130
+ 100.64.29.130
+ ["Exploiting Host"]
+ 0.83125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.30
+ 100.64.18.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+ INCIDENT_LINK
+ 1716366767
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de1f7c80-1815-11ef-a290-d5e92fd7ebc0
+
+
+
diff --git a/graph/incidents_graphml/d/de223350-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/d/de223350-fc2b-11ed-b0ec-2b4cf5491294.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88045262bf6550f7d5e76b1e0fee4b6c4538f9ad
--- /dev/null
+++ b/graph/incidents_graphml/d/de223350-fc2b-11ed-b0ec-2b4cf5491294.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.87
+ 100.64.35.87
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685150086
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de223350-fc2b-11ed-b0ec-2b4cf5491294
+
+
+ INCIDENT_LINK
+ 1685150086
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de223350-fc2b-11ed-b0ec-2b4cf5491294
+
+
+
diff --git a/graph/incidents_graphml/d/de2645e0-1166-11ed-8727-e3874c058ed5.graphml b/graph/incidents_graphml/d/de2645e0-1166-11ed-8727-e3874c058ed5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7548c937c28149bb2fdfb99ccc725b022568c1c
--- /dev/null
+++ b/graph/incidents_graphml/d/de2645e0-1166-11ed-8727-e3874c058ed5.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.28
+ USER-0015-1674.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.90
+ 100.64.74.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.91
+ 100.64.74.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.228
+ 100.64.70.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659336902
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ de2645e0-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336902
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ de2645e0-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336902
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ de2645e0-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336902
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ de2645e0-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336902
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ de2645e0-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336902
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ de2645e0-1166-11ed-8727-e3874c058ed5
+
+
+
diff --git a/graph/incidents_graphml/d/de294d10-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/de294d10-7bc0-11ee-bf1f-2f975ac76263.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7eb35e3520da247fa813f38b1057ecdfbc0cf48
--- /dev/null
+++ b/graph/incidents_graphml/d/de294d10-7bc0-11ee-bf1f-2f975ac76263.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.161
+ 100.64.32.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699177878
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de294d10-7bc0-11ee-bf1f-2f975ac76263
+
+
+
diff --git a/graph/incidents_graphml/d/de33bf00-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/de33bf00-295b-11ee-af70-f9ca9a13f131.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e2056358c492ce78a7abfc5b5d3ece83cb35c39
--- /dev/null
+++ b/graph/incidents_graphml/d/de33bf00-295b-11ee-af70-f9ca9a13f131.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.90
+ USER-0015-1279.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690118504
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de33bf00-295b-11ee-af70-f9ca9a13f131
+
+
+
diff --git a/graph/incidents_graphml/d/de37c510-eb97-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/d/de37c510-eb97-11ee-8f3a-6b2412cfa52f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..447bb43cf0e7f0c7f91d3bad653e56d54aa344de
--- /dev/null
+++ b/graph/incidents_graphml/d/de37c510-eb97-11ee-8f3a-6b2412cfa52f.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.25
+ 100.64.70.25
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.69.159
+ 100.64.69.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.59.184
+ 100.64.59.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711474799
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de37c510-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474799
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de37c510-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474799
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de37c510-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474799
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de37c510-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474799
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de37c510-eb97-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474799
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de37c510-eb97-11ee-8f3a-6b2412cfa52f
+
+
+
diff --git a/graph/incidents_graphml/d/de3b0c00-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/de3b0c00-9027-11ee-bb83-2712b06e9008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca4d89e57e3b91352d1cc534e35674b2ef53c6ca
--- /dev/null
+++ b/graph/incidents_graphml/d/de3b0c00-9027-11ee-bb83-2712b06e9008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.124
+ 100.64.55.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701421140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ de3b0c00-9027-11ee-bb83-2712b06e9008
+
+
+
diff --git a/graph/incidents_graphml/d/de40cd40-154c-11ed-a263-3f9dd6de5ee1.graphml b/graph/incidents_graphml/d/de40cd40-154c-11ed-a263-3f9dd6de5ee1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..642f0462a6b34ee20b319d6559d376cbc8f45ae9
--- /dev/null
+++ b/graph/incidents_graphml/d/de40cd40-154c-11ed-a263-3f9dd6de5ee1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.187
+ USER-0015-1624.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659765540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de40cd40-154c-11ed-a263-3f9dd6de5ee1
+
+
+
diff --git a/graph/incidents_graphml/d/de43a0e0-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/d/de43a0e0-138b-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..909918ac12372c34145f43254ec2ae53f9beb785
--- /dev/null
+++ b/graph/incidents_graphml/d/de43a0e0-138b-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.93
+ 100.64.60.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687720194
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de43a0e0-138b-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687720194
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de43a0e0-138b-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/d/de43d560-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/d/de43d560-a4a5-11ed-b478-67badd244434.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9da2180ba10567bfdd267fea7bd8720e45f63af
--- /dev/null
+++ b/graph/incidents_graphml/d/de43d560-a4a5-11ed-b478-67badd244434.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.155
+ 100.64.82.155
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.55
+ 100.64.1.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1675526782
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de43d560-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526782
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de43d560-a4a5-11ed-b478-67badd244434
+
+
+
diff --git a/graph/incidents_graphml/d/de484c90-2ac8-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/d/de484c90-2ac8-11ee-a22a-2dc333e44cac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5579a28d256514aaf2cff2e91aadfe969140a6a
--- /dev/null
+++ b/graph/incidents_graphml/d/de484c90-2ac8-11ee-a22a-2dc333e44cac.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.181
+ 100.64.39.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.86
+ 100.64.2.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.151
+ 100.64.39.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.171
+ 100.64.14.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.182
+ 100.64.39.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.133
+ 100.64.33.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.54
+ 100.64.39.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.183
+ 100.64.39.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de484c90-2ac8-11ee-a22a-2dc333e44cac
+
+
+
diff --git a/graph/incidents_graphml/d/de493cd0-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/de493cd0-9027-11ee-bb83-2712b06e9008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1793adf24f1cba3a6d9203d147610b3a522fe73d
--- /dev/null
+++ b/graph/incidents_graphml/d/de493cd0-9027-11ee-bb83-2712b06e9008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.126
+ 100.64.55.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701421140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de493cd0-9027-11ee-bb83-2712b06e9008
+
+
+
diff --git a/graph/incidents_graphml/d/de4a16f0-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/d/de4a16f0-a4a5-11ed-b478-67badd244434.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1ef9baf08c17088f0698c4e190e355a4cf50eb5
--- /dev/null
+++ b/graph/incidents_graphml/d/de4a16f0-a4a5-11ed-b478-67badd244434.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.156
+ 100.64.82.156
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.181
+ 100.64.75.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1675526782
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de4a16f0-a4a5-11ed-b478-67badd244434
+
+
+ INCIDENT_LINK
+ 1675526782
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de4a16f0-a4a5-11ed-b478-67badd244434
+
+
+
diff --git a/graph/incidents_graphml/d/de4cc540-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/de4cc540-295b-11ee-af70-f9ca9a13f131.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67dcf59a2dd4ac0ca095c8b62ad7c29a2dbd7b12
--- /dev/null
+++ b/graph/incidents_graphml/d/de4cc540-295b-11ee-af70-f9ca9a13f131.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.90
+ USER-0015-1279.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690118504
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de4cc540-295b-11ee-af70-f9ca9a13f131
+
+
+
diff --git a/graph/incidents_graphml/d/de56f870-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/de56f870-9027-11ee-bb83-2712b06e9008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a72a781b805f915b5013e98af0a67ac63069469
--- /dev/null
+++ b/graph/incidents_graphml/d/de56f870-9027-11ee-bb83-2712b06e9008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.126
+ 100.64.55.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701421140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ de56f870-9027-11ee-bb83-2712b06e9008
+
+
+
diff --git a/graph/incidents_graphml/d/de5b3850-2ac8-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/d/de5b3850-2ac8-11ee-a22a-2dc333e44cac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6829bda4c8849d2edfe51d4ece24dbea92d009e4
--- /dev/null
+++ b/graph/incidents_graphml/d/de5b3850-2ac8-11ee-a22a-2dc333e44cac.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.204
+ 100.64.2.204
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.187
+ 100.64.39.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.188
+ 100.64.39.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de5b3850-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de5b3850-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de5b3850-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de5b3850-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de5b3850-2ac8-11ee-a22a-2dc333e44cac
+
+
+ INCIDENT_LINK
+ 1690275270
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de5b3850-2ac8-11ee-a22a-2dc333e44cac
+
+
+
diff --git a/graph/incidents_graphml/d/de5fb180-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/d/de5fb180-fc2b-11ed-b0ec-2b4cf5491294.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd7e4d0cfa045bd41fc3d37812e099272e5fca50
--- /dev/null
+++ b/graph/incidents_graphml/d/de5fb180-fc2b-11ed-b0ec-2b4cf5491294.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.35.87
+ 100.64.35.87
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685150086
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ de5fb180-fc2b-11ed-b0ec-2b4cf5491294
+
+
+
diff --git a/graph/incidents_graphml/d/de6104c0-9f34-11ee-ab4f-6ff6fea5e350.graphml b/graph/incidents_graphml/d/de6104c0-9f34-11ee-ab4f-6ff6fea5e350.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68c291b8300a970f629c62d1ac02f303757ee4d9
--- /dev/null
+++ b/graph/incidents_graphml/d/de6104c0-9f34-11ee-ab4f-6ff6fea5e350.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.138
+ 100.64.49.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.213
+ 100.64.18.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.139
+ 100.64.49.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.120
+ 100.64.8.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703075991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de6104c0-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de6104c0-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de6104c0-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de6104c0-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de6104c0-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de6104c0-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de6104c0-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de6104c0-9f34-11ee-ab4f-6ff6fea5e350
+
+
+
diff --git a/graph/incidents_graphml/d/de62e120-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/de62e120-57c5-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac35eb2e432cd91d0313e79917790738b894ac3d
--- /dev/null
+++ b/graph/incidents_graphml/d/de62e120-57c5-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,151 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.114
+ USER-0015-1204.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695221784
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de62e120-57c5-11ee-8f21-8ba3e02675af
+
+
+ INCIDENT_LINK
+ 1695221784
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de62e120-57c5-11ee-8f21-8ba3e02675af
+
+
+ INCIDENT_LINK
+ 1695221784
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de62e120-57c5-11ee-8f21-8ba3e02675af
+
+
+ INCIDENT_LINK
+ 1695221784
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de62e120-57c5-11ee-8f21-8ba3e02675af
+
+
+ INCIDENT_LINK
+ 1695221784
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de62e120-57c5-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/d/de6580c0-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/d/de6580c0-138b-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bae5105c2a2a14e746d1af9e12ce18b0e58df624
--- /dev/null
+++ b/graph/incidents_graphml/d/de6580c0-138b-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.2
+ 100.64.69.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.15
+ 100.64.74.15
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687720194
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de6580c0-138b-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687720194
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de6580c0-138b-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/d/de674090-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/d/de674090-3312-11ed-a5b7-31dcf2c00f36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e2b6ee042ba64decf92619719e4e78246787647
--- /dev/null
+++ b/graph/incidents_graphml/d/de674090-3312-11ed-a5b7-31dcf2c00f36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.20.115
+ 100.64.20.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663039165
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de674090-3312-11ed-a5b7-31dcf2c00f36
+
+
+
diff --git a/graph/incidents_graphml/d/de6a5790-0c8c-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/d/de6a5790-0c8c-11ee-af4a-2171e1d29da4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d6b49c0403560548272df51436c3c654281d1a7
--- /dev/null
+++ b/graph/incidents_graphml/d/de6a5790-0c8c-11ee-af4a-2171e1d29da4.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.52
+ USER-0015-1514.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.177
+ 100.64.11.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.53
+ 100.64.69.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.29.19
+ 100.64.29.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6a5790-0c8c-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6a5790-0c8c-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6a5790-0c8c-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6a5790-0c8c-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6a5790-0c8c-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6a5790-0c8c-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6a5790-0c8c-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6a5790-0c8c-11ee-af4a-2171e1d29da4
+
+
+
diff --git a/graph/incidents_graphml/d/de6cefa0-0c8c-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/d/de6cefa0-0c8c-11ee-af4a-2171e1d29da4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9cf2d06f0567408e7019077a31511b94631908d6
--- /dev/null
+++ b/graph/incidents_graphml/d/de6cefa0-0c8c-11ee-af4a-2171e1d29da4.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.2
+ 100.64.18.2
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.25.3
+ 100.64.25.3
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.75
+ 100.64.7.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6cefa0-0c8c-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6cefa0-0c8c-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6cefa0-0c8c-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6cefa0-0c8c-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6cefa0-0c8c-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686950966
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6cefa0-0c8c-11ee-af4a-2171e1d29da4
+
+
+
diff --git a/graph/incidents_graphml/d/de6d55a0-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/d/de6d55a0-5b2c-11ee-a5b1-e563b721d2c6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d09cf63eb0411d153159b9266c2e03a82cc62d57
--- /dev/null
+++ b/graph/incidents_graphml/d/de6d55a0-5b2c-11ee-a5b1-e563b721d2c6.graphml
@@ -0,0 +1,169 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.173
+ 100.64.68.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.62.44
+ 100.64.62.44
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.155
+ 100.64.7.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ de6d55a0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ de6d55a0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ de6d55a0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ de6d55a0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ de6d55a0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ de6d55a0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ de6d55a0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+
diff --git a/graph/incidents_graphml/d/de6e4000-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/d/de6e4000-5b2c-11ee-a5b1-e563b721d2c6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0f105a4b78d278169b18024297a33467bf6dbfd
--- /dev/null
+++ b/graph/incidents_graphml/d/de6e4000-5b2c-11ee-a5b1-e563b721d2c6.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.33
+ 100.64.11.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.174
+ 100.64.68.174
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6e4000-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6e4000-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6e4000-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6e4000-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6e4000-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de6e4000-5b2c-11ee-a5b1-e563b721d2c6
+
+
+
diff --git a/graph/incidents_graphml/d/de798340-fe69-11ed-a136-877286d930e4.graphml b/graph/incidents_graphml/d/de798340-fe69-11ed-a136-877286d930e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e22c36ecbbace4e7447abc3cfff72e5b543d4c6b
--- /dev/null
+++ b/graph/incidents_graphml/d/de798340-fe69-11ed-a136-877286d930e4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.107
+ 100.64.7.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685396617
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de798340-fe69-11ed-a136-877286d930e4
+
+
+ INCIDENT_LINK
+ 1685396617
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ de798340-fe69-11ed-a136-877286d930e4
+
+
+
diff --git a/graph/incidents_graphml/d/de7a3d00-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/de7a3d00-9562-11ed-94b8-8539433cb390.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..590d17c23b8102311ddf5da616f34c05ded2a719
--- /dev/null
+++ b/graph/incidents_graphml/d/de7a3d00-9562-11ed-94b8-8539433cb390.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.170
+ 100.64.78.170
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.211
+ 100.64.72.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1673848739
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de7a3d00-9562-11ed-94b8-8539433cb390
+
+
+ INCIDENT_LINK
+ 1673848739
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de7a3d00-9562-11ed-94b8-8539433cb390
+
+
+
diff --git a/graph/incidents_graphml/d/de8d9240-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/de8d9240-57d3-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2fe0cd30b897bdabeb1439ddfcbb799c641068ba
--- /dev/null
+++ b/graph/incidents_graphml/d/de8d9240-57d3-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,409 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.61.23
+ 100.64.61.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.24
+ 100.64.61.24
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.29
+ 100.64.15.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.25
+ 100.64.61.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.69
+ 100.64.44.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.194
+ 100.64.25.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.244
+ 100.64.3.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.26
+ 100.64.61.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.227
+ 100.64.23.227
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de8d9240-57d3-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/d/de9a8920-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/d/de9a8920-3683-11ef-865b-773bd844d05a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29b2094500068cd3f49c63fadf43cae15d52f132
--- /dev/null
+++ b/graph/incidents_graphml/d/de9a8920-3683-11ef-865b-773bd844d05a.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.189
+ 100.64.21.189
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.190
+ 100.64.21.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.191
+ 100.64.21.191
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.192
+ 100.64.21.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.193
+ 100.64.21.193
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de9a8920-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de9a8920-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de9a8920-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de9a8920-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de9a8920-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de9a8920-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de9a8920-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de9a8920-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de9a8920-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ de9a8920-3683-11ef-865b-773bd844d05a
+
+
+
diff --git a/graph/incidents_graphml/d/de9aba00-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/de9aba00-57c5-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..379a9114a62331bda7a3d741034e08ec8e06b255
--- /dev/null
+++ b/graph/incidents_graphml/d/de9aba00-57c5-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.174
+ 100.64.13.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695221785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ de9aba00-57c5-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/d/dea5fad0-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/d/dea5fad0-3683-11ef-865b-773bd844d05a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ffeae4de4a570bc1585ff05b8514b9ba0e13ef1
--- /dev/null
+++ b/graph/incidents_graphml/d/dea5fad0-3683-11ef-865b-773bd844d05a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.198
+ 100.64.21.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.199
+ 100.64.21.199
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dea5fad0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dea5fad0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dea5fad0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dea5fad0-3683-11ef-865b-773bd844d05a
+
+
+
diff --git a/graph/incidents_graphml/d/dea93da0-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/dea93da0-3452-11ee-9106-1db75c7cc651.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43a04ced9e60d309b31bc66bf290f20bfde51209
--- /dev/null
+++ b/graph/incidents_graphml/d/dea93da0-3452-11ee-9106-1db75c7cc651.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.19
+ 100.64.62.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691324102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dea93da0-3452-11ee-9106-1db75c7cc651
+
+
+
diff --git a/graph/incidents_graphml/d/deaa96f0-74ad-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/deaa96f0-74ad-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b35601605d0e39c423ccd2373fa2f09010690726
--- /dev/null
+++ b/graph/incidents_graphml/d/deaa96f0-74ad-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.185
+ 100.64.67.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698400060
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ deaa96f0-74ad-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/d/deb19390-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/d/deb19390-3683-11ef-865b-773bd844d05a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..667b8353e01f3d69f594d47cfca07df19591f3b1
--- /dev/null
+++ b/graph/incidents_graphml/d/deb19390-3683-11ef-865b-773bd844d05a.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.202
+ 100.64.21.202
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.203
+ 100.64.21.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.204
+ 100.64.21.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ deb19390-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ deb19390-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ deb19390-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ deb19390-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ deb19390-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712547
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ deb19390-3683-11ef-865b-773bd844d05a
+
+
+
diff --git a/graph/incidents_graphml/d/debc6b30-9f34-11ee-ab4f-6ff6fea5e350.graphml b/graph/incidents_graphml/d/debc6b30-9f34-11ee-ab4f-6ff6fea5e350.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..736f9211ed010f7b3b278f8306f1ee15b470fdee
--- /dev/null
+++ b/graph/incidents_graphml/d/debc6b30-9f34-11ee-ab4f-6ff6fea5e350.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.142
+ 100.64.49.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703075991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ debc6b30-9f34-11ee-ab4f-6ff6fea5e350
+
+
+
diff --git a/graph/incidents_graphml/d/dec02100-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/dec02100-3452-11ee-9106-1db75c7cc651.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7dc183930e55c5afc2e1d995503d0592f1567048
--- /dev/null
+++ b/graph/incidents_graphml/d/dec02100-3452-11ee-9106-1db75c7cc651.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.19
+ 100.64.62.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691324102
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dec02100-3452-11ee-9106-1db75c7cc651
+
+
+
diff --git a/graph/incidents_graphml/d/decac310-9f34-11ee-ab4f-6ff6fea5e350.graphml b/graph/incidents_graphml/d/decac310-9f34-11ee-ab4f-6ff6fea5e350.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e3dc86d5b560f4beac954ece708562795bab0f7
--- /dev/null
+++ b/graph/incidents_graphml/d/decac310-9f34-11ee-ab4f-6ff6fea5e350.graphml
@@ -0,0 +1,561 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.144
+ 100.64.49.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.145
+ 100.64.49.145
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.204
+ 100.64.20.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.102
+ 100.64.20.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.134
+ 100.64.33.134
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.146
+ 100.64.49.146
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.147
+ 100.64.49.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.148
+ 100.64.49.148
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.252
+ 100.64.7.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.149
+ 100.64.49.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ decac310-9f34-11ee-ab4f-6ff6fea5e350
+
+
+
diff --git a/graph/incidents_graphml/d/ded602a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml b/graph/incidents_graphml/d/ded602a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44a8bba47a42f96dcaac10386912b04406fb3d3a
--- /dev/null
+++ b/graph/incidents_graphml/d/ded602a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.162
+ 100.64.71.162
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1680126693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ ded602a0-ce7b-11ed-9e5b-155bf57fc5c4
+
+
+
diff --git a/graph/incidents_graphml/d/ded80980-9f34-11ee-ab4f-6ff6fea5e350.graphml b/graph/incidents_graphml/d/ded80980-9f34-11ee-ab4f-6ff6fea5e350.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..502c7d8efd61b8ed3cc17e17f6e0e6acd1fa2f5e
--- /dev/null
+++ b/graph/incidents_graphml/d/ded80980-9f34-11ee-ab4f-6ff6fea5e350.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.144
+ 100.64.49.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703075992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ ded80980-9f34-11ee-ab4f-6ff6fea5e350
+
+
+
diff --git a/graph/incidents_graphml/d/ded82d80-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/ded82d80-71b6-11ee-b078-c3c891418ab6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f61a41d66ac15fcf3866b91daf1faedfab10a205
--- /dev/null
+++ b/graph/incidents_graphml/d/ded82d80-71b6-11ee-b078-c3c891418ab6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.102
+ 100.64.17.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698074073
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ ded82d80-71b6-11ee-b078-c3c891418ab6
+
+
+
diff --git a/graph/incidents_graphml/d/dedba7f0-ce7b-11ed-9e5b-155bf57fc5c4.graphml b/graph/incidents_graphml/d/dedba7f0-ce7b-11ed-9e5b-155bf57fc5c4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55e4b7dd40e76ad73ccf473b7ceb076edf12f49a
--- /dev/null
+++ b/graph/incidents_graphml/d/dedba7f0-ce7b-11ed-9e5b-155bf57fc5c4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.71.162
+ 100.64.71.162
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1680126693
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dedba7f0-ce7b-11ed-9e5b-155bf57fc5c4
+
+
+
diff --git a/graph/incidents_graphml/d/dee61030-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/dee61030-71b6-11ee-b078-c3c891418ab6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3742b3c6cdfb94fe56a1c4cbd140ac41eae2c825
--- /dev/null
+++ b/graph/incidents_graphml/d/dee61030-71b6-11ee-b078-c3c891418ab6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.150
+ 100.64.9.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698074073
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dee61030-71b6-11ee-b078-c3c891418ab6
+
+
+
diff --git a/graph/incidents_graphml/d/dee87930-ce7b-11ed-9e5b-155bf57fc5c4.graphml b/graph/incidents_graphml/d/dee87930-ce7b-11ed-9e5b-155bf57fc5c4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..875612c297b8a10a1cc2ed4808f4cb8093487e7d
--- /dev/null
+++ b/graph/incidents_graphml/d/dee87930-ce7b-11ed-9e5b-155bf57fc5c4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.190
+ 100.64.75.190
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1680126693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dee87930-ce7b-11ed-9e5b-155bf57fc5c4
+
+
+
diff --git a/graph/incidents_graphml/d/dee9c460-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/dee9c460-57c5-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..222e220f3b3e314020aa179ec15a54d146f27cf4
--- /dev/null
+++ b/graph/incidents_graphml/d/dee9c460-57c5-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.16
+ 100.64.14.16
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695221785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dee9c460-57c5-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/d/deeaacf0-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/deeaacf0-9027-11ee-bb83-2712b06e9008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..37d8cc4b467410d601e6552787049c2cff6a798f
--- /dev/null
+++ b/graph/incidents_graphml/d/deeaacf0-9027-11ee-bb83-2712b06e9008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.128
+ 100.64.55.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701421141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ deeaacf0-9027-11ee-bb83-2712b06e9008
+
+
+
diff --git a/graph/incidents_graphml/d/deedd060-ce7b-11ed-9e5b-155bf57fc5c4.graphml b/graph/incidents_graphml/d/deedd060-ce7b-11ed-9e5b-155bf57fc5c4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3b6f136a5533743657708320544dda3116b3c723
--- /dev/null
+++ b/graph/incidents_graphml/d/deedd060-ce7b-11ed-9e5b-155bf57fc5c4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.190
+ 100.64.75.190
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1680126693
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ deedd060-ce7b-11ed-9e5b-155bf57fc5c4
+
+
+
diff --git a/graph/incidents_graphml/d/def7f360-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/def7f360-9027-11ee-bb83-2712b06e9008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..73c83be40669c0d0b4d5784d253560ff83c0dd43
--- /dev/null
+++ b/graph/incidents_graphml/d/def7f360-9027-11ee-bb83-2712b06e9008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.128
+ 100.64.55.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701421141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ def7f360-9027-11ee-bb83-2712b06e9008
+
+
+
diff --git a/graph/incidents_graphml/d/defa1810-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/defa1810-57c5-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69940b03aad72cb47cb0a920d2f6addbf4ae3492
--- /dev/null
+++ b/graph/incidents_graphml/d/defa1810-57c5-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.16
+ 100.64.14.16
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695221785
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ defa1810-57c5-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/d/df0252b0-9e14-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/d/df0252b0-9e14-11ee-a5ab-8550688be6fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c633a5b4c11e72bb4a006079007710849cc26d38
--- /dev/null
+++ b/graph/incidents_graphml/d/df0252b0-9e14-11ee-a5ab-8550688be6fd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.144
+ 100.64.10.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1702952297
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df0252b0-9e14-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952297
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df0252b0-9e14-11ee-a5ab-8550688be6fd
+
+
+
diff --git a/graph/incidents_graphml/d/df02e3c0-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/d/df02e3c0-0010-11ef-83c1-e54678fd0000.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..117c56915eee9d0c442bbd3b85f18a9ba3ef3e42
--- /dev/null
+++ b/graph/incidents_graphml/d/df02e3c0-0010-11ef-83c1-e54678fd0000.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.171
+ 100.64.69.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Okta","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713725793
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df02e3c0-0010-11ef-83c1-e54678fd0000
+
+
+
diff --git a/graph/incidents_graphml/d/df044f70-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/df044f70-9027-11ee-bb83-2712b06e9008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6811d71c5debe4b5bc000529bbc6d9b7ca6ef36f
--- /dev/null
+++ b/graph/incidents_graphml/d/df044f70-9027-11ee-bb83-2712b06e9008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.23
+ 100.64.8.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701421141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df044f70-9027-11ee-bb83-2712b06e9008
+
+
+
diff --git a/graph/incidents_graphml/d/df0531d0-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/d/df0531d0-3683-11ef-865b-773bd844d05a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8ca3dc63add0b64556771b83a0eb1155b17c234
--- /dev/null
+++ b/graph/incidents_graphml/d/df0531d0-3683-11ef-865b-773bd844d05a.graphml
@@ -0,0 +1,581 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.208
+ 100.64.21.208
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.209
+ 100.64.21.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.210
+ 100.64.21.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.211
+ 100.64.21.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.212
+ 100.64.21.212
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.128
+ 100.64.3.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.213
+ 100.64.21.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.214
+ 100.64.21.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.215
+ 100.64.21.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.216
+ 100.64.21.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.71
+ 100.64.7.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.217
+ 100.64.21.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712548
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df0531d0-3683-11ef-865b-773bd844d05a
+
+
+
diff --git a/graph/incidents_graphml/d/df0c77e0-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/d/df0c77e0-274f-11ee-9ae4-f7600c9ae4b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20843047c0c904e11d983ff12788a997e93aca54
--- /dev/null
+++ b/graph/incidents_graphml/d/df0c77e0-274f-11ee-9ae4-f7600c9ae4b6.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.79
+ 100.64.63.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.71
+ 100.64.31.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.9
+ 100.64.3.9
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.100
+ 100.64.50.100
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.35
+ 100.64.52.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689893449
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df0c77e0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893449
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df0c77e0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893449
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df0c77e0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893449
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df0c77e0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893449
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df0c77e0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893449
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df0c77e0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893449
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df0c77e0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893449
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df0c77e0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893449
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df0c77e0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893449
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df0c77e0-274f-11ee-9ae4-f7600c9ae4b6
+
+
+
diff --git a/graph/incidents_graphml/d/df116ed0-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/df116ed0-9027-11ee-bb83-2712b06e9008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5feaebfbd3f7fedf028b3b219adc4c412d76a0a2
--- /dev/null
+++ b/graph/incidents_graphml/d/df116ed0-9027-11ee-bb83-2712b06e9008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.23
+ 100.64.8.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701421141
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df116ed0-9027-11ee-bb83-2712b06e9008
+
+
+
diff --git a/graph/incidents_graphml/d/df16bf70-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/df16bf70-57d3-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e7113643f07ed7b5f5840b15b5d8ebcdab9cdef
--- /dev/null
+++ b/graph/incidents_graphml/d/df16bf70-57d3-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,151 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.31
+ 100.64.61.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.32
+ 100.64.61.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.61
+ 100.64.12.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.33
+ 100.64.61.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695227798
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ df16bf70-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227798
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ df16bf70-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227798
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ df16bf70-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227798
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ df16bf70-57d3-11ee-9e4b-6beca2c0696d
+
+
+ INCIDENT_LINK
+ 1695227798
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ df16bf70-57d3-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/d/df1bc0b0-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/d/df1bc0b0-13f4-11ee-9bb8-6b8312f57fd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5214ba0bf79fe970b2392ccf8d868ae652eb5388
--- /dev/null
+++ b/graph/incidents_graphml/d/df1bc0b0-13f4-11ee-9bb8-6b8312f57fd1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.170.40
+ 192.168.170.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.228
+ 100.64.72.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687765293
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df1bc0b0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765293
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df1bc0b0-13f4-11ee-9bb8-6b8312f57fd1
+
+
+
diff --git a/graph/incidents_graphml/d/df1ca530-ff7f-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/d/df1ca530-ff7f-11ee-b9e5-11c35e54feda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d25c86c08e8c0eb9bf8d9bf0f6e86a81fefb994d
--- /dev/null
+++ b/graph/incidents_graphml/d/df1ca530-ff7f-11ee-b9e5-11c35e54feda.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.247
+ 100.64.47.247
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.69.229
+ 100.64.69.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713663516
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df1ca530-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663516
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df1ca530-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663516
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df1ca530-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663516
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df1ca530-ff7f-11ee-b9e5-11c35e54feda
+
+
+
diff --git a/graph/incidents_graphml/d/df2210a0-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/df2210a0-9027-11ee-bb83-2712b06e9008.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76b69549aea076eb194ebc69ba9eb421f41867c0
--- /dev/null
+++ b/graph/incidents_graphml/d/df2210a0-9027-11ee-bb83-2712b06e9008.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.168
+ 100.64.42.168
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701421141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ df2210a0-9027-11ee-bb83-2712b06e9008
+
+
+
diff --git a/graph/incidents_graphml/d/df2586d0-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/d/df2586d0-766f-11ee-81bc-199b4060a9b4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d0971facf2ff003da37c28036fac64bef20c3fc
--- /dev/null
+++ b/graph/incidents_graphml/d/df2586d0-766f-11ee-81bc-199b4060a9b4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.164
+ 100.64.22.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698593335
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df2586d0-766f-11ee-81bc-199b4060a9b4
+
+
+
diff --git a/graph/incidents_graphml/d/df30f0d0-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/d/df30f0d0-f135-11ec-9654-cb9d1f320859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a07d285cc99fcbcde9ed5bf4abce52e1cbe5f4f0
--- /dev/null
+++ b/graph/incidents_graphml/d/df30f0d0-f135-11ec-9654-cb9d1f320859.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.41
+ USER-0015-1707.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655797422
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ df30f0d0-f135-11ec-9654-cb9d1f320859
+
+
+
diff --git a/graph/incidents_graphml/d/df331b60-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/d/df331b60-766f-11ee-81bc-199b4060a9b4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a23f49e8219dc222ecb74cab7f344d44f54ef377
--- /dev/null
+++ b/graph/incidents_graphml/d/df331b60-766f-11ee-81bc-199b4060a9b4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.130
+ 100.64.24.130
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698593335
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df331b60-766f-11ee-81bc-199b4060a9b4
+
+
+
diff --git a/graph/incidents_graphml/d/df3e1b40-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/df3e1b40-71b6-11ee-b078-c3c891418ab6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3848aa267b682b1b64933050950d3aef2c7b7eb3
--- /dev/null
+++ b/graph/incidents_graphml/d/df3e1b40-71b6-11ee-b078-c3c891418ab6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.89
+ 100.64.37.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698074073
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ df3e1b40-71b6-11ee-b078-c3c891418ab6
+
+
+
diff --git a/graph/incidents_graphml/d/df41c160-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/d/df41c160-766f-11ee-81bc-199b4060a9b4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba90315245a2355c79b36c0639a209e96f24020c
--- /dev/null
+++ b/graph/incidents_graphml/d/df41c160-766f-11ee-81bc-199b4060a9b4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.130
+ 100.64.24.130
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698593335
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df41c160-766f-11ee-81bc-199b4060a9b4
+
+
+
diff --git a/graph/incidents_graphml/d/df41cf70-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/df41cf70-57c5-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..731d1a5dd16375fd851f0afcbc6bf2a134e86256
--- /dev/null
+++ b/graph/incidents_graphml/d/df41cf70-57c5-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695221786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df41cf70-57c5-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/d/df47acd0-ff7f-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/d/df47acd0-ff7f-11ee-b9e5-11c35e54feda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd26acb72781fc59a9a3caf4ede14d4bea39d1c9
--- /dev/null
+++ b/graph/incidents_graphml/d/df47acd0-ff7f-11ee-b9e5-11c35e54feda.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.154
+ 100.64.24.154
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1713663516
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df47acd0-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663516
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df47acd0-ff7f-11ee-b9e5-11c35e54feda
+
+
+
diff --git a/graph/incidents_graphml/d/df48a2f0-39d9-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/d/df48a2f0-39d9-11ee-b92b-37d2cd449a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2618e62a904c76d85c06a6047783e3938f8afcb
--- /dev/null
+++ b/graph/incidents_graphml/d/df48a2f0-39d9-11ee-b92b-37d2cd449a32.graphml
@@ -0,0 +1,445 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.210
+ 100.64.54.210
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.211
+ 100.64.54.211
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.31
+ 100.64.15.31
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.212
+ 100.64.54.212
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.213
+ 100.64.54.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.214
+ 100.64.54.214
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.147
+ 100.64.24.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.108
+ 100.64.24.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931841
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df48a2f0-39d9-11ee-b92b-37d2cd449a32
+
+
+
diff --git a/graph/incidents_graphml/d/df4df9c0-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/df4df9c0-71b6-11ee-b078-c3c891418ab6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1fe5d5893ce4eae82d95f5482793136964ceba3
--- /dev/null
+++ b/graph/incidents_graphml/d/df4df9c0-71b6-11ee-b078-c3c891418ab6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.89
+ 100.64.37.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698074074
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df4df9c0-71b6-11ee-b078-c3c891418ab6
+
+
+
diff --git a/graph/incidents_graphml/d/df529850-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/df529850-57c5-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a7a966c7fcd171e1239b8f9edd1ac143175eb78
--- /dev/null
+++ b/graph/incidents_graphml/d/df529850-57c5-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695221786
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df529850-57c5-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/d/df549120-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/d/df549120-3d0b-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f3eeac49a7f76acf379e34e0532579ebbc6352c
--- /dev/null
+++ b/graph/incidents_graphml/d/df549120-3d0b-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.240
+ 100.64.59.240
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692283169
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df549120-3d0b-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/d/df5bdc70-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/df5bdc70-71b6-11ee-b078-c3c891418ab6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c3f1a8ef24d056707401b003e450a7ed0700a2e7
--- /dev/null
+++ b/graph/incidents_graphml/d/df5bdc70-71b6-11ee-b078-c3c891418ab6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.32
+ 100.64.53.32
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698074074
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df5bdc70-71b6-11ee-b078-c3c891418ab6
+
+
+
diff --git a/graph/incidents_graphml/d/df5d4b60-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/df5d4b60-3452-11ee-9106-1db75c7cc651.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b999401cefafd2de27bfd4d4bd08b4af19fcfc44
--- /dev/null
+++ b/graph/incidents_graphml/d/df5d4b60-3452-11ee-9106-1db75c7cc651.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.38
+ 100.64.64.38
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691324103
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df5d4b60-3452-11ee-9106-1db75c7cc651
+
+
+
diff --git a/graph/incidents_graphml/d/df5f4280-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/df5f4280-57c5-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f86c98648a47c08e72490c09456a63ccf2bec9b
--- /dev/null
+++ b/graph/incidents_graphml/d/df5f4280-57c5-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,195 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.20
+ 100.64.14.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695221786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df5f4280-57c5-11ee-8f21-8ba3e02675af
+
+
+ INCIDENT_LINK
+ 1695221786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df5f4280-57c5-11ee-8f21-8ba3e02675af
+
+
+ INCIDENT_LINK
+ 1695221786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df5f4280-57c5-11ee-8f21-8ba3e02675af
+
+
+ INCIDENT_LINK
+ 1695221786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df5f4280-57c5-11ee-8f21-8ba3e02675af
+
+
+ INCIDENT_LINK
+ 1695221786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df5f4280-57c5-11ee-8f21-8ba3e02675af
+
+
+ INCIDENT_LINK
+ 1695221786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df5f4280-57c5-11ee-8f21-8ba3e02675af
+
+
+ INCIDENT_LINK
+ 1695221786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df5f4280-57c5-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/d/df632460-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/d/df632460-f135-11ec-9654-cb9d1f320859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f50aff94e409e9c078ed20d9c3f64f19621622dc
--- /dev/null
+++ b/graph/incidents_graphml/d/df632460-f135-11ec-9654-cb9d1f320859.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.43
+ 100.64.75.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.40
+ USER-0015-1612.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655797422
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df632460-f135-11ec-9654-cb9d1f320859
+
+
+ INCIDENT_LINK
+ 1655797422
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df632460-f135-11ec-9654-cb9d1f320859
+
+
+
diff --git a/graph/incidents_graphml/d/df68fbd0-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/df68fbd0-71b6-11ee-b078-c3c891418ab6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9dc1ec7271f8b5d9059885f78b4fa60fb5ecaa28
--- /dev/null
+++ b/graph/incidents_graphml/d/df68fbd0-71b6-11ee-b078-c3c891418ab6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.32
+ 100.64.53.32
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698074074
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df68fbd0-71b6-11ee-b078-c3c891418ab6
+
+
+
diff --git a/graph/incidents_graphml/d/df6d7c20-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/d/df6d7c20-54cc-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f05aa054a7f1e27e9e13eb7af534bb398791b85
--- /dev/null
+++ b/graph/incidents_graphml/d/df6d7c20-54cc-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.77
+ 100.64.27.77
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694894939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df6d7c20-54cc-11ee-acde-a35f456e55de
+
+
+ INCIDENT_LINK
+ 1694894939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df6d7c20-54cc-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/d/df6d9a60-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/df6d9a60-57c5-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1f28f6e23fc69edd83f90db2a8c4b9d64f45b82
--- /dev/null
+++ b/graph/incidents_graphml/d/df6d9a60-57c5-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.20
+ 100.64.14.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695221786
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df6d9a60-57c5-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/d/df6e2800-675a-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/d/df6e2800-675a-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9234e5569da4ea76bd3407a2396944aed445632f
--- /dev/null
+++ b/graph/incidents_graphml/d/df6e2800-675a-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.29
+ 100.64.12.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696935048
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df6e2800-675a-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/d/df74e420-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/d/df74e420-2f46-11ee-8421-f3eff1a35bff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae63d7748857a34df0e1e8a2b8ab8fd0eb698dec
--- /dev/null
+++ b/graph/incidents_graphml/d/df74e420-2f46-11ee-8421-f3eff1a35bff.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.129
+ 100.64.76.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.114
+ 100.64.71.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.130
+ 100.64.76.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690769193
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df74e420-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769193
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df74e420-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769193
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df74e420-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769193
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df74e420-2f46-11ee-8421-f3eff1a35bff
+
+
+
diff --git a/graph/incidents_graphml/d/df7c2220-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/d/df7c2220-54cc-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8dcd418567dd3286bf023d6b547e137d612a4fa4
--- /dev/null
+++ b/graph/incidents_graphml/d/df7c2220-54cc-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.77
+ 100.64.27.77
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694894939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ df7c2220-54cc-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/d/df7d1c20-675a-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/d/df7d1c20-675a-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6050f729a1b3e64e6edeb9caca3206ee724a5c3
--- /dev/null
+++ b/graph/incidents_graphml/d/df7d1c20-675a-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.29
+ 100.64.12.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696935049
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df7d1c20-675a-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/d/df7e6340-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/df7e6340-57c5-11ee-8f21-8ba3e02675af.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80fdad781b14d750fd3aef6dd54722c3e341994b
--- /dev/null
+++ b/graph/incidents_graphml/d/df7e6340-57c5-11ee-8f21-8ba3e02675af.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.22
+ 100.64.14.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695221786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df7e6340-57c5-11ee-8f21-8ba3e02675af
+
+
+
diff --git a/graph/incidents_graphml/d/df821170-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/df821170-3452-11ee-9106-1db75c7cc651.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4232c4e41fb5fd475323e39323b6e7d8c3d9f199
--- /dev/null
+++ b/graph/incidents_graphml/d/df821170-3452-11ee-9106-1db75c7cc651.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.38
+ 100.64.64.38
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691324103
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ df821170-3452-11ee-9106-1db75c7cc651
+
+
+
diff --git a/graph/incidents_graphml/d/df87ee70-1601-11ee-b5b0-23eb7b8b596d.graphml b/graph/incidents_graphml/d/df87ee70-1601-11ee-b5b0-23eb7b8b596d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60b97515b9a2684d5d0261ae12ffa3acb6b1334e
--- /dev/null
+++ b/graph/incidents_graphml/d/df87ee70-1601-11ee-b5b0-23eb7b8b596d.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.183
+ 100.64.47.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.161
+ 100.64.59.161
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.171
+ 100.64.14.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.171
+ 100.64.30.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.162
+ 100.64.59.162
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687990779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df87ee70-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df87ee70-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df87ee70-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df87ee70-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df87ee70-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df87ee70-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df87ee70-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df87ee70-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df87ee70-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990779
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ df87ee70-1601-11ee-b5b0-23eb7b8b596d
+
+
+
diff --git a/graph/incidents_graphml/d/df893050-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/df893050-57d3-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af20add711628a248e22890aa33bddcd81368d3b
--- /dev/null
+++ b/graph/incidents_graphml/d/df893050-57d3-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695227799
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df893050-57d3-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/d/df9b0aa0-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/df9b0aa0-57d3-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4f922d12d9c5753887ac57baa1c29a95b4652ef
--- /dev/null
+++ b/graph/incidents_graphml/d/df9b0aa0-57d3-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.203
+ 100.64.23.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695227799
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ df9b0aa0-57d3-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/d/dfa2e400-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/d/dfa2e400-54cc-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5355f67cbfbd3fe29680611dd09cf8ba42bb513
--- /dev/null
+++ b/graph/incidents_graphml/d/dfa2e400-54cc-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.120
+ 100.64.30.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694894939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfa2e400-54cc-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/d/dfabe090-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/dfabe090-3452-11ee-9106-1db75c7cc651.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54e9227e89d9de6ed3d1c38c197cf42610a3ed15
--- /dev/null
+++ b/graph/incidents_graphml/d/dfabe090-3452-11ee-9106-1db75c7cc651.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.40
+ 100.64.64.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691324104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfabe090-3452-11ee-9106-1db75c7cc651
+
+
+
diff --git a/graph/incidents_graphml/d/dfb1b110-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/d/dfb1b110-54cc-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55d88237ec8e5a61ea6a4418e6f45a2b9210c5d4
--- /dev/null
+++ b/graph/incidents_graphml/d/dfb1b110-54cc-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.120
+ 100.64.30.120
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694894939
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dfb1b110-54cc-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/d/dfb93280-b136-11ed-8c7d-65e7f37a4d8d.graphml b/graph/incidents_graphml/d/dfb93280-b136-11ed-8c7d-65e7f37a4d8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..424d58715aaf8241b9361a179cc7a8d461a499c1
--- /dev/null
+++ b/graph/incidents_graphml/d/dfb93280-b136-11ed-8c7d-65e7f37a4d8d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.239
+ 100.64.83.239
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.75.193.220
+ 10.75.193.220
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Trend Deep Security","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1676908475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfb93280-b136-11ed-8c7d-65e7f37a4d8d
+
+
+ INCIDENT_LINK
+ 1676908475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfb93280-b136-11ed-8c7d-65e7f37a4d8d
+
+
+
diff --git a/graph/incidents_graphml/d/dfbf3300-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/d/dfbf3300-3683-11ef-865b-773bd844d05a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f97f4302f320373cd340737b4070a3026adc5297
--- /dev/null
+++ b/graph/incidents_graphml/d/dfbf3300-3683-11ef-865b-773bd844d05a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.72
+ 100.64.15.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.230
+ 100.64.21.230
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719712549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfbf3300-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfbf3300-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfbf3300-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfbf3300-3683-11ef-865b-773bd844d05a
+
+
+
diff --git a/graph/incidents_graphml/d/dfc3c940-1166-11ed-8727-e3874c058ed5.graphml b/graph/incidents_graphml/d/dfc3c940-1166-11ed-8727-e3874c058ed5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2929a8666f38f7eec79909a917faf7bc5db37e04
--- /dev/null
+++ b/graph/incidents_graphml/d/dfc3c940-1166-11ed-8727-e3874c058ed5.graphml
@@ -0,0 +1,625 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.92
+ 100.64.74.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.133
+ 100.64.72.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.93
+ 100.64.74.93
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.51
+ 100.64.73.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.94
+ 100.64.74.94
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.156
+ 100.64.71.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.58
+ 100.64.72.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.232
+ 100.64.71.232
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.91
+ 100.64.72.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.128
+ 100.64.71.128
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.8
+ 100.64.74.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.95
+ 100.64.74.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.248
+ 100.64.70.248
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.4
+ 100.64.72.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.96
+ 100.64.74.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.233
+ 100.64.71.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.77
+ 100.64.73.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.75
+ 100.64.73.75
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+ INCIDENT_LINK
+ 1659336905
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfc3c940-1166-11ed-8727-e3874c058ed5
+
+
+
diff --git a/graph/incidents_graphml/d/dfc4a840-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/d/dfc4a840-5b2c-11ee-a5b1-e563b721d2c6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7791860eff0bce903a46f3cf728abbaa76ddc561
--- /dev/null
+++ b/graph/incidents_graphml/d/dfc4a840-5b2c-11ee-a5b1-e563b721d2c6.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.88
+ 100.64.12.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.81015625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.175
+ 100.64.68.175
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.176
+ 100.64.68.176
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595878
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfc4a840-5b2c-11ee-a5b1-e563b721d2c6
+
+
+
diff --git a/graph/incidents_graphml/d/dfcffbe0-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/d/dfcffbe0-3683-11ef-865b-773bd844d05a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..621d0ad7f88b0484a6846b18ae442f5204fb19b8
--- /dev/null
+++ b/graph/incidents_graphml/d/dfcffbe0-3683-11ef-865b-773bd844d05a.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.232
+ 100.64.21.232
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.176
+ 100.64.5.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.233
+ USER-0015-1231.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719712549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfcffbe0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfcffbe0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfcffbe0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfcffbe0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfcffbe0-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712549
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dfcffbe0-3683-11ef-865b-773bd844d05a
+
+
+
diff --git a/graph/incidents_graphml/d/dfd2ba20-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/dfd2ba20-71b6-11ee-b078-c3c891418ab6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe090a21e1644166a487a2dc91fd261e1598f3ee
--- /dev/null
+++ b/graph/incidents_graphml/d/dfd2ba20-71b6-11ee-b078-c3c891418ab6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.133
+ 100.64.11.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698074074
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dfd2ba20-71b6-11ee-b078-c3c891418ab6
+
+
+
diff --git a/graph/incidents_graphml/d/dfd4be00-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/dfd4be00-6e29-11ee-b3d5-39e2e796f8b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcbdaa6a882656116e0cb4112827c6c84a85b551
--- /dev/null
+++ b/graph/incidents_graphml/d/dfd4be00-6e29-11ee-b3d5-39e2e796f8b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.206
+ 100.64.51.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697683662
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfd4be00-6e29-11ee-b3d5-39e2e796f8b3
+
+
+
diff --git a/graph/incidents_graphml/d/dfdbf560-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/d/dfdbf560-54cc-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..034050d593a2040ee4b9e3579b59b0990041e523
--- /dev/null
+++ b/graph/incidents_graphml/d/dfdbf560-54cc-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.122
+ 100.64.30.122
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694894940
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ dfdbf560-54cc-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/d/dfe07350-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/d/dfe07350-5ebe-11ee-b36b-27983c746e66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..982da52acd1d027a072d7f839622d460ef1a0712
--- /dev/null
+++ b/graph/incidents_graphml/d/dfe07350-5ebe-11ee-b36b-27983c746e66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.123
+ 100.64.38.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695988438
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dfe07350-5ebe-11ee-b36b-27983c746e66
+
+
+
diff --git a/graph/incidents_graphml/d/dfe44e60-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/dfe44e60-6e29-11ee-b3d5-39e2e796f8b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6566f8bbe2b4c0ad7ce5f567b04b6fcfba2118c9
--- /dev/null
+++ b/graph/incidents_graphml/d/dfe44e60-6e29-11ee-b3d5-39e2e796f8b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.206
+ 100.64.51.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697683662
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dfe44e60-6e29-11ee-b3d5-39e2e796f8b3
+
+
+
diff --git a/graph/incidents_graphml/d/dfea9b60-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/d/dfea9b60-54cc-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2202f72ce95948d92b6ce27b4cea6ee0c771a038
--- /dev/null
+++ b/graph/incidents_graphml/d/dfea9b60-54cc-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.122
+ 100.64.30.122
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694894940
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dfea9b60-54cc-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/d/dfeb37c0-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/d/dfeb37c0-8418-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6d6b37707a887542188a1a6ea7100a6d0bd739ea
--- /dev/null
+++ b/graph/incidents_graphml/d/dfeb37c0-8418-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.217
+ 100.64.5.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700095286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ dfeb37c0-8418-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/d/dff17450-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/d/dff17450-0cae-11ee-9176-191794f15128.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da985b2f56318d53875555fed3ab5d89b78fd787
--- /dev/null
+++ b/graph/incidents_graphml/d/dff17450-0cae-11ee-9176-191794f15128.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.22.74
+ 100.64.22.74
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686965571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ dff17450-0cae-11ee-9176-191794f15128
+
+
+
diff --git a/graph/incidents_graphml/d/dff1b630-1c77-11ee-bf94-2d3c5e21d992.graphml b/graph/incidents_graphml/d/dff1b630-1c77-11ee-bf94-2d3c5e21d992.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ffc6ed2a7d8d861466fd2942f9ec0e7b1a19b785
--- /dev/null
+++ b/graph/incidents_graphml/d/dff1b630-1c77-11ee-bf94-2d3c5e21d992.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688701168
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ dff1b630-1c77-11ee-bf94-2d3c5e21d992
+
+
+
diff --git a/graph/incidents_graphml/d/dff47c10-74ad-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/dff47c10-74ad-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..957af5b9d07f231cfa341d4dc265aff53504180a
--- /dev/null
+++ b/graph/incidents_graphml/d/dff47c10-74ad-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.242
+ 100.64.12.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698400063
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dff47c10-74ad-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/d/dff96890-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/d/dff96890-8418-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9e8790566c337deb65de2e6ade9f839ce835e05
--- /dev/null
+++ b/graph/incidents_graphml/d/dff96890-8418-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.217
+ 100.64.5.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700095286
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ dff96890-8418-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/e/e00639d0-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e00639d0-8418-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da6f746b1bed7405e2479a04089ddcd4f8660378
--- /dev/null
+++ b/graph/incidents_graphml/e/e00639d0-8418-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.167
+ 100.64.16.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700095286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e00639d0-8418-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/e/e0076d50-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e0076d50-0cae-11ee-9176-191794f15128.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a933d19ecc59546ce472b1c86cbeb4cf1b40ec19
--- /dev/null
+++ b/graph/incidents_graphml/e/e0076d50-0cae-11ee-9176-191794f15128.graphml
@@ -0,0 +1,121 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.74
+ 100.64.21.74
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.170
+ HOST-14697
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.116
+ 100.64.72.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.29.13
+ 100.64.29.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686965571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0076d50-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0076d50-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0076d50-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965571
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0076d50-0cae-11ee-9176-191794f15128
+
+
+
diff --git a/graph/incidents_graphml/e/e00dc750-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/e/e00dc750-71b6-11ee-b078-c3c891418ab6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77bcf82f9d848b297f686d1d8e879bc7594ebd5d
--- /dev/null
+++ b/graph/incidents_graphml/e/e00dc750-71b6-11ee-b078-c3c891418ab6.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.120
+ 100.64.9.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698074075
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e00dc750-71b6-11ee-b078-c3c891418ab6
+
+
+ INCIDENT_LINK
+ 1698074075
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e00dc750-71b6-11ee-b078-c3c891418ab6
+
+
+
diff --git a/graph/incidents_graphml/e/e00ee9d0-3a81-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/e/e00ee9d0-3a81-11ee-b55b-6596b150fac1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba2469fc40f2b2a4ad7044a5b720045abfb6abde
--- /dev/null
+++ b/graph/incidents_graphml/e/e00ee9d0-3a81-11ee-b55b-6596b150fac1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692003997
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e00ee9d0-3a81-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692003997
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e00ee9d0-3a81-11ee-b55b-6596b150fac1
+
+
+
diff --git a/graph/incidents_graphml/e/e0155500-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e0155500-8418-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b70f64e6eaf0ee718844b9832aab49fcdbe224b9
--- /dev/null
+++ b/graph/incidents_graphml/e/e0155500-8418-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.167
+ 100.64.16.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700095286
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0155500-8418-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/e/e01750b0-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/e/e01750b0-54cc-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..128ebea50ca699a1637b3520291d5e4f1404b97a
--- /dev/null
+++ b/graph/incidents_graphml/e/e01750b0-54cc-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.220
+ 100.64.23.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694894940
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e01750b0-54cc-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/e/e01827f0-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e01827f0-2da4-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7484d473884859b10cbce46183a082b70435acf1
--- /dev/null
+++ b/graph/incidents_graphml/e/e01827f0-2da4-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.171
+ 100.64.37.171
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690589665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e01827f0-2da4-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/e/e01bdfb0-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e01bdfb0-0cae-11ee-9176-191794f15128.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e28d1eca5fe612a0f270efa667428e8665b5dd3c
--- /dev/null
+++ b/graph/incidents_graphml/e/e01bdfb0-0cae-11ee-9176-191794f15128.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.246
+ 100.64.48.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686965572
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e01bdfb0-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965572
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e01bdfb0-0cae-11ee-9176-191794f15128
+
+
+
diff --git a/graph/incidents_graphml/e/e022aee0-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/e/e022aee0-71b6-11ee-b078-c3c891418ab6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57954852fa4352f943eb96c7468a24e03e45f2ea
--- /dev/null
+++ b/graph/incidents_graphml/e/e022aee0-71b6-11ee-b078-c3c891418ab6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.120
+ 100.64.9.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698074075
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e022aee0-71b6-11ee-b078-c3c891418ab6
+
+
+
diff --git a/graph/incidents_graphml/e/e0243220-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e0243220-766f-11ee-81bc-199b4060a9b4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf03e9c608167cee0912495bafe8b3722bdd47d5
--- /dev/null
+++ b/graph/incidents_graphml/e/e0243220-766f-11ee-81bc-199b4060a9b4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.141
+ 100.64.22.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698593336
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0243220-766f-11ee-81bc-199b4060a9b4
+
+
+
diff --git a/graph/incidents_graphml/e/e02819b0-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e02819b0-8418-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..700096588d365cb5e837b55bda71e909cff409f4
--- /dev/null
+++ b/graph/incidents_graphml/e/e02819b0-8418-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.164
+ 100.64.16.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700095287
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e02819b0-8418-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/e/e02a76c0-11ca-11ef-a994-fb0e1dc0413b.graphml b/graph/incidents_graphml/e/e02a76c0-11ca-11ef-a994-fb0e1dc0413b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e36914d3fb40927c6852b94a1b69c66eb131fde
--- /dev/null
+++ b/graph/incidents_graphml/e/e02a76c0-11ca-11ef-a994-fb0e1dc0413b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.242
+ 100.64.66.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715674851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e02a76c0-11ca-11ef-a994-fb0e1dc0413b
+
+
+
diff --git a/graph/incidents_graphml/e/e0328d60-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/e/e0328d60-71b6-11ee-b078-c3c891418ab6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72ac8df4a5a144fc7768f5dfaa2f49aead177351
--- /dev/null
+++ b/graph/incidents_graphml/e/e0328d60-71b6-11ee-b078-c3c891418ab6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.50
+ 100.64.51.50
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698074075
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0328d60-71b6-11ee-b078-c3c891418ab6
+
+
+
diff --git a/graph/incidents_graphml/e/e0358230-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e0358230-0cae-11ee-9176-191794f15128.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5c9afb0ee8aa4deb49a9eb6ccfe8895050f8eaa
--- /dev/null
+++ b/graph/incidents_graphml/e/e0358230-0cae-11ee-9176-191794f15128.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.237
+ 100.64.77.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686965572
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0358230-0cae-11ee-9176-191794f15128
+
+
+
diff --git a/graph/incidents_graphml/e/e0367190-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e0367190-8418-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c73826b5a51d1a13192fcdc8ae6346a3dccb1f4
--- /dev/null
+++ b/graph/incidents_graphml/e/e0367190-8418-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.164
+ 100.64.16.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700095287
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e0367190-8418-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/e/e03b63a0-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e03b63a0-766f-11ee-81bc-199b4060a9b4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a55bacb01d33d0cfbeae936ddc3d13c499a7d2a
--- /dev/null
+++ b/graph/incidents_graphml/e/e03b63a0-766f-11ee-81bc-199b4060a9b4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.141
+ 100.64.22.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698593337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e03b63a0-766f-11ee-81bc-199b4060a9b4
+
+
+
diff --git a/graph/incidents_graphml/e/e03b8e70-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e03b8e70-2da4-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1559d471332c1569a4bb61baffb03dcd4578eaf
--- /dev/null
+++ b/graph/incidents_graphml/e/e03b8e70-2da4-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.171
+ 100.64.37.171
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690589665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e03b8e70-2da4-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/e/e0512080-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e0512080-0cae-11ee-9176-191794f15128.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e10216efd3e0944c2360dd6bc16b177ec55bbea
--- /dev/null
+++ b/graph/incidents_graphml/e/e0512080-0cae-11ee-9176-191794f15128.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.237
+ 100.64.77.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686965572
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e0512080-0cae-11ee-9176-191794f15128
+
+
+
diff --git a/graph/incidents_graphml/e/e05a19b0-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e05a19b0-6fe1-11ee-ab93-b9aa077096ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d571fe43f81f701039caf7bf34e4f3c61f4c70e
--- /dev/null
+++ b/graph/incidents_graphml/e/e05a19b0-6fe1-11ee-ab93-b9aa077096ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.29
+ 100.64.17.29
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697872641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e05a19b0-6fe1-11ee-ab93-b9aa077096ae
+
+
+
diff --git a/graph/incidents_graphml/e/e05b2720-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/e/e05b2720-0bf4-11ee-9b02-ffb3de173f5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..259d55315ef5c379f697ced1ec12db0b59f49325
--- /dev/null
+++ b/graph/incidents_graphml/e/e05b2720-0bf4-11ee-9b02-ffb3de173f5d.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.237
+ 100.64.60.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.21
+ 100.64.71.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.7.150
+ 100.64.7.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686885685
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e05b2720-0bf4-11ee-9b02-ffb3de173f5d
+
+
+ INCIDENT_LINK
+ 1686885685
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e05b2720-0bf4-11ee-9b02-ffb3de173f5d
+
+
+ INCIDENT_LINK
+ 1686885685
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e05b2720-0bf4-11ee-9b02-ffb3de173f5d
+
+
+ INCIDENT_LINK
+ 1686885685
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e05b2720-0bf4-11ee-9b02-ffb3de173f5d
+
+
+
diff --git a/graph/incidents_graphml/e/e05e92e0-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/e/e05e92e0-54cc-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a26e7854c238921824cf698ec8ab784878191c0b
--- /dev/null
+++ b/graph/incidents_graphml/e/e05e92e0-54cc-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.124
+ 100.64.30.124
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694894941
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e05e92e0-54cc-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/e/e05f9130-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e05f9130-2da4-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e22363b52b6d02fc0356f09286ba9c652a868f79
--- /dev/null
+++ b/graph/incidents_graphml/e/e05f9130-2da4-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.241
+ 100.64.9.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690589665
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e05f9130-2da4-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/e/e0651db0-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e0651db0-0cae-11ee-9176-191794f15128.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b7d4f9f44744f2388022055fcf8f07d206580a9
--- /dev/null
+++ b/graph/incidents_graphml/e/e0651db0-0cae-11ee-9176-191794f15128.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.247
+ 100.64.23.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.52
+ 100.64.72.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686965573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0651db0-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0651db0-0cae-11ee-9176-191794f15128
+
+
+
diff --git a/graph/incidents_graphml/e/e065f700-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/e/e065f700-5ebe-11ee-b36b-27983c746e66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68b47cd987436aec184e6a03e63abe5e30b8233b
--- /dev/null
+++ b/graph/incidents_graphml/e/e065f700-5ebe-11ee-b36b-27983c746e66.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.125
+ 100.64.11.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695988439
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e065f700-5ebe-11ee-b36b-27983c746e66
+
+
+ INCIDENT_LINK
+ 1695988439
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e065f700-5ebe-11ee-b36b-27983c746e66
+
+
+
diff --git a/graph/incidents_graphml/e/e06a1f40-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e06a1f40-6fe1-11ee-ab93-b9aa077096ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b112dfd37dba779fc865d83240df1409b4371062
--- /dev/null
+++ b/graph/incidents_graphml/e/e06a1f40-6fe1-11ee-ab93-b9aa077096ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.29
+ 100.64.17.29
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697872641
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e06a1f40-6fe1-11ee-ab93-b9aa077096ae
+
+
+
diff --git a/graph/incidents_graphml/e/e06a4250-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/e/e06a4250-0bf4-11ee-9b02-ffb3de173f5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94c096830655f22a8ee1c80326309be06d5bfc47
--- /dev/null
+++ b/graph/incidents_graphml/e/e06a4250-0bf4-11ee-9b02-ffb3de173f5d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.52
+ 100.64.31.52
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.204
+ 100.64.80.204
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686885686
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e06a4250-0bf4-11ee-9b02-ffb3de173f5d
+
+
+ INCIDENT_LINK
+ 1686885686
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e06a4250-0bf4-11ee-9b02-ffb3de173f5d
+
+
+
diff --git a/graph/incidents_graphml/e/e06d11d0-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/e/e06d11d0-54cc-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85a485c04247e7d43a1f3eea9981880db210d394
--- /dev/null
+++ b/graph/incidents_graphml/e/e06d11d0-54cc-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.124
+ 100.64.30.124
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694894941
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e06d11d0-54cc-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/e/e0734310-71ba-11ee-ba6f-c94c097ae35c.graphml b/graph/incidents_graphml/e/e0734310-71ba-11ee-ba6f-c94c097ae35c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..964a793bb4473c1994b9cf64d21fbb940cd8db88
--- /dev/null
+++ b/graph/incidents_graphml/e/e0734310-71ba-11ee-ba6f-c94c097ae35c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.53.83
+ 172.31.53.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 10.181.72.179
+ 10.181.72.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1698075793
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e0734310-71ba-11ee-ba6f-c94c097ae35c
+
+
+
diff --git a/graph/incidents_graphml/e/e0775c20-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/e/e0775c20-5ebe-11ee-b36b-27983c746e66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ed44e2a778f45928ea59252ced48f442a598d6c
--- /dev/null
+++ b/graph/incidents_graphml/e/e0775c20-5ebe-11ee-b36b-27983c746e66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.125
+ 100.64.11.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695988439
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e0775c20-5ebe-11ee-b36b-27983c746e66
+
+
+
diff --git a/graph/incidents_graphml/e/e077f700-f0fb-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/e/e077f700-f0fb-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..597f2e3f9869ef52a4d3b252f3c2cf17082e42a5
--- /dev/null
+++ b/graph/incidents_graphml/e/e077f700-f0fb-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.170
+ 100.64.25.170
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712067508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e077f700-f0fb-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/e/e07a72f0-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e07a72f0-6fe1-11ee-ab93-b9aa077096ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20068642d1dc291c9a4ca714d70c45053596b8de
--- /dev/null
+++ b/graph/incidents_graphml/e/e07a72f0-6fe1-11ee-ab93-b9aa077096ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.31
+ 100.64.17.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697872642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e07a72f0-6fe1-11ee-ab93-b9aa077096ae
+
+
+
diff --git a/graph/incidents_graphml/e/e07b90c0-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/e/e07b90c0-54cc-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f2ada6ca51f11e1482d62462e67e2090f4f7bd84
--- /dev/null
+++ b/graph/incidents_graphml/e/e07b90c0-54cc-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.126
+ 100.64.30.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694894941
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e07b90c0-54cc-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/e/e07c9110-1c77-11ee-bf94-2d3c5e21d992.graphml b/graph/incidents_graphml/e/e07c9110-1c77-11ee-bf94-2d3c5e21d992.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..898f8e80f5ecc88fc687e89db07852de52e267c3
--- /dev/null
+++ b/graph/incidents_graphml/e/e07c9110-1c77-11ee-bf94-2d3c5e21d992.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.164
+ 100.64.48.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688701168
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e07c9110-1c77-11ee-bf94-2d3c5e21d992
+
+
+
diff --git a/graph/incidents_graphml/e/e08396c0-71ba-11ee-ba6f-c94c097ae35c.graphml b/graph/incidents_graphml/e/e08396c0-71ba-11ee-ba6f-c94c097ae35c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c5ea4904508da9b6e044360a5265b139dfc8295
--- /dev/null
+++ b/graph/incidents_graphml/e/e08396c0-71ba-11ee-ba6f-c94c097ae35c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.181.72.179
+ 10.181.72.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 172.31.53.83
+ 172.31.53.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698075794
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e08396c0-71ba-11ee-ba6f-c94c097ae35c
+
+
+
diff --git a/graph/incidents_graphml/e/e083df00-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e083df00-3312-11ed-a5b7-31dcf2c00f36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a21713a70a298fa45b3b72c7f88f47da1ca3654
--- /dev/null
+++ b/graph/incidents_graphml/e/e083df00-3312-11ed-a5b7-31dcf2c00f36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.94
+ 100.64.94.94
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663039168
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e083df00-3312-11ed-a5b7-31dcf2c00f36
+
+
+
diff --git a/graph/incidents_graphml/e/e087af90-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e087af90-3312-11ed-a5b7-31dcf2c00f36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52449206a8c203f9777b3574045d46d374302d55
--- /dev/null
+++ b/graph/incidents_graphml/e/e087af90-3312-11ed-a5b7-31dcf2c00f36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.11.13
+ 100.64.11.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663039168
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e087af90-3312-11ed-a5b7-31dcf2c00f36
+
+
+
diff --git a/graph/incidents_graphml/e/e088cad0-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e088cad0-6fe1-11ee-ab93-b9aa077096ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b0e72c0939eb6848e9a4c1027cccb350b01afc9
--- /dev/null
+++ b/graph/incidents_graphml/e/e088cad0-6fe1-11ee-ab93-b9aa077096ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.31
+ 100.64.17.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697872642
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e088cad0-6fe1-11ee-ab93-b9aa077096ae
+
+
+
diff --git a/graph/incidents_graphml/e/e089aa40-f0fb-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/e/e089aa40-f0fb-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7286829bf89e518706787249e891e24a268552c
--- /dev/null
+++ b/graph/incidents_graphml/e/e089aa40-f0fb-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.170
+ 100.64.25.170
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712067509
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e089aa40-f0fb-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/e/e08edb80-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e08edb80-3312-11ed-a5b7-31dcf2c00f36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61923acfc0cd3dc6fefa2468dab21bdfbe8d0cc9
--- /dev/null
+++ b/graph/incidents_graphml/e/e08edb80-3312-11ed-a5b7-31dcf2c00f36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.165
+ 100.64.12.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663039168
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e08edb80-3312-11ed-a5b7-31dcf2c00f36
+
+
+
diff --git a/graph/incidents_graphml/e/e0954420-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e0954420-3312-11ed-a5b7-31dcf2c00f36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67ca96a05ce76c2c69e8af03afb3ca115bbf9b67
--- /dev/null
+++ b/graph/incidents_graphml/e/e0954420-3312-11ed-a5b7-31dcf2c00f36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.12.165
+ 100.64.12.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663039168
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0954420-3312-11ed-a5b7-31dcf2c00f36
+
+
+
diff --git a/graph/incidents_graphml/e/e098c690-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e098c690-3312-11ed-a5b7-31dcf2c00f36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f3aef4828da2e4a01effe9a4b694f68bfec22a5
--- /dev/null
+++ b/graph/incidents_graphml/e/e098c690-3312-11ed-a5b7-31dcf2c00f36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.102
+ 100.64.94.102
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663039168
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e098c690-3312-11ed-a5b7-31dcf2c00f36
+
+
+
diff --git a/graph/incidents_graphml/e/e0a24e80-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/e/e0a24e80-fc2b-11ed-b0ec-2b4cf5491294.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9ec2a2cc302d4c4ccf7bfab8c1e52909e11a2bd
--- /dev/null
+++ b/graph/incidents_graphml/e/e0a24e80-fc2b-11ed-b0ec-2b4cf5491294.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.88
+ 100.64.35.88
+ []
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685150090
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e0a24e80-fc2b-11ed-b0ec-2b4cf5491294
+
+
+
diff --git a/graph/incidents_graphml/e/e0a96e40-71ba-11ee-ba6f-c94c097ae35c.graphml b/graph/incidents_graphml/e/e0a96e40-71ba-11ee-ba6f-c94c097ae35c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1aefc5083419c9abd8c23cb1d8bc3eeaa08f915
--- /dev/null
+++ b/graph/incidents_graphml/e/e0a96e40-71ba-11ee-ba6f-c94c097ae35c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.121.20
+ 172.21.121.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.115
+ 100.64.90.115
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1698075794
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e0a96e40-71ba-11ee-ba6f-c94c097ae35c
+
+
+ INCIDENT_LINK
+ 1698075794
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e0a96e40-71ba-11ee-ba6f-c94c097ae35c
+
+
+
diff --git a/graph/incidents_graphml/e/e0ac4e90-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e0ac4e90-3312-11ed-a5b7-31dcf2c00f36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f6b13659181834520caa0e22d632b12d6af241c
--- /dev/null
+++ b/graph/incidents_graphml/e/e0ac4e90-3312-11ed-a5b7-31dcf2c00f36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.85
+ 100.64.84.85
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663039169
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0ac4e90-3312-11ed-a5b7-31dcf2c00f36
+
+
+
diff --git a/graph/incidents_graphml/e/e0aca1c0-1c77-11ee-bf94-2d3c5e21d992.graphml b/graph/incidents_graphml/e/e0aca1c0-1c77-11ee-bf94-2d3c5e21d992.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85562b2be6d5a151462784fb6a41055bcca73b44
--- /dev/null
+++ b/graph/incidents_graphml/e/e0aca1c0-1c77-11ee-bf94-2d3c5e21d992.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688701169
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0aca1c0-1c77-11ee-bf94-2d3c5e21d992
+
+
+
diff --git a/graph/incidents_graphml/e/e0b32c60-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e0b32c60-3312-11ed-a5b7-31dcf2c00f36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7af4339352fbe1b0db8beb105e32e4323e0be6a1
--- /dev/null
+++ b/graph/incidents_graphml/e/e0b32c60-3312-11ed-a5b7-31dcf2c00f36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.84.85
+ 100.64.84.85
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663039169
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0b32c60-3312-11ed-a5b7-31dcf2c00f36
+
+
+
diff --git a/graph/incidents_graphml/e/e0b611e0-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e0b611e0-766f-11ee-81bc-199b4060a9b4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51dad858faf4a5499240141a044ca11a26c07b89
--- /dev/null
+++ b/graph/incidents_graphml/e/e0b611e0-766f-11ee-81bc-199b4060a9b4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.132
+ 100.64.24.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698593337
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0b611e0-766f-11ee-81bc-199b4060a9b4
+
+
+
diff --git a/graph/incidents_graphml/e/e0b95d30-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e0b95d30-8418-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ed7410db7e95921a74dbe8cba868b7c656078ac
--- /dev/null
+++ b/graph/incidents_graphml/e/e0b95d30-8418-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.169
+ 100.64.16.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700095288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e0b95d30-8418-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/e/e0c0fa10-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/e/e0c0fa10-fc2b-11ed-b0ec-2b4cf5491294.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..541aec74f7323b81e78dd660e82f50e391c1f2f2
--- /dev/null
+++ b/graph/incidents_graphml/e/e0c0fa10-fc2b-11ed-b0ec-2b4cf5491294.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.35.88
+ 100.64.35.88
+ []
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685150090
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e0c0fa10-fc2b-11ed-b0ec-2b4cf5491294
+
+
+
diff --git a/graph/incidents_graphml/e/e0c3d340-1c77-11ee-bf94-2d3c5e21d992.graphml b/graph/incidents_graphml/e/e0c3d340-1c77-11ee-bf94-2d3c5e21d992.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f6018d8528d086dcd1f69f251e74705a1f2011d
--- /dev/null
+++ b/graph/incidents_graphml/e/e0c3d340-1c77-11ee-bf94-2d3c5e21d992.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.90
+ 100.64.11.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688701169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0c3d340-1c77-11ee-bf94-2d3c5e21d992
+
+
+
diff --git a/graph/incidents_graphml/e/e0c6dac0-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e0c6dac0-766f-11ee-81bc-199b4060a9b4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..514e96f1fa23f5ca0056801317203543560ef160
--- /dev/null
+++ b/graph/incidents_graphml/e/e0c6dac0-766f-11ee-81bc-199b4060a9b4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.132
+ 100.64.24.132
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698593338
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0c6dac0-766f-11ee-81bc-199b4060a9b4
+
+
+
diff --git a/graph/incidents_graphml/e/e0c7b510-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e0c7b510-8418-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7093f8ca01360543eb5248f0480565177cbbb78c
--- /dev/null
+++ b/graph/incidents_graphml/e/e0c7b510-8418-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.169
+ 100.64.16.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700095288
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0c7b510-8418-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/e/e0d45d60-56b4-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/e/e0d45d60-56b4-11ee-be44-f1fe26834d88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ca82b2265a2a10385d5bc489d6530ed8ae59ae9
--- /dev/null
+++ b/graph/incidents_graphml/e/e0d45d60-56b4-11ee-be44-f1fe26834d88.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.203
+ 100.64.23.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1695104536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0d45d60-56b4-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695104536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0d45d60-56b4-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695104536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0d45d60-56b4-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695104536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0d45d60-56b4-11ee-be44-f1fe26834d88
+
+
+
diff --git a/graph/incidents_graphml/e/e0d4bd70-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e0d4bd70-766f-11ee-81bc-199b4060a9b4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76b856d64d15f3e45513c095ffe4adbb52b8f36f
--- /dev/null
+++ b/graph/incidents_graphml/e/e0d4bd70-766f-11ee-81bc-199b4060a9b4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.134
+ 100.64.24.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698593338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0d4bd70-766f-11ee-81bc-199b4060a9b4
+
+
+
diff --git a/graph/incidents_graphml/e/e0d82fd0-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e0d82fd0-8418-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f9cdcd3d48a40056df27d6ff4907cc9f8b2a0a4
--- /dev/null
+++ b/graph/incidents_graphml/e/e0d82fd0-8418-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.171
+ 100.64.16.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700095288
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0d82fd0-8418-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/e/e0da4220-9f34-11ee-ab4f-6ff6fea5e350.graphml b/graph/incidents_graphml/e/e0da4220-9f34-11ee-ab4f-6ff6fea5e350.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ed9cdf26652873df1f1aa4b8d862bbc7a5608a3
--- /dev/null
+++ b/graph/incidents_graphml/e/e0da4220-9f34-11ee-ab4f-6ff6fea5e350.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.142
+ 100.64.49.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.156
+ 100.64.49.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703075995
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0da4220-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075995
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0da4220-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075995
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0da4220-9f34-11ee-ab4f-6ff6fea5e350
+
+
+ INCIDENT_LINK
+ 1703075995
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0da4220-9f34-11ee-ab4f-6ff6fea5e350
+
+
+
diff --git a/graph/incidents_graphml/e/e0db2700-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/e/e0db2700-576b-11ee-b369-595b8ff2e388.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be04b7ef5382e3e8820b23957addb9f79f007c53
--- /dev/null
+++ b/graph/incidents_graphml/e/e0db2700-576b-11ee-b369-595b8ff2e388.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.76
+ 100.64.54.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695183134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0db2700-576b-11ee-b369-595b8ff2e388
+
+
+
diff --git a/graph/incidents_graphml/e/e0e3b190-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e0e3b190-766f-11ee-81bc-199b4060a9b4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf6ee257301c36bd9ae9f074d31dd1bfdcb24fbe
--- /dev/null
+++ b/graph/incidents_graphml/e/e0e3b190-766f-11ee-81bc-199b4060a9b4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.134
+ 100.64.24.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698593338
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0e3b190-766f-11ee-81bc-199b4060a9b4
+
+
+
diff --git a/graph/incidents_graphml/e/e0f14620-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e0f14620-766f-11ee-81bc-199b4060a9b4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83065239e799a0d3a72e9e3b952bd54a7b14836a
--- /dev/null
+++ b/graph/incidents_graphml/e/e0f14620-766f-11ee-81bc-199b4060a9b4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.22
+ 100.64.8.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698593338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e0f14620-766f-11ee-81bc-199b4060a9b4
+
+
+
diff --git a/graph/incidents_graphml/e/e0fbaa20-39d9-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/e/e0fbaa20-39d9-11ee-b92b-37d2cd449a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4db789659aeeb80cde2b6a4dd6ed1b48c4ab3634
--- /dev/null
+++ b/graph/incidents_graphml/e/e0fbaa20-39d9-11ee-b92b-37d2cd449a32.graphml
@@ -0,0 +1,789 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.25
+ 100.64.8.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.224
+ 100.64.54.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.225
+ 100.64.54.225
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.226
+ 100.64.54.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.51
+ 100.64.40.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.227
+ 100.64.54.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.228
+ 100.64.54.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.229
+ 100.64.54.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.71
+ 100.64.10.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.230
+ 100.64.54.230
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.90
+ 100.64.31.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.42
+ 100.64.9.42
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.133
+ 100.64.45.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.231
+ 100.64.54.231
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.25
+ 100.64.12.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+ INCIDENT_LINK
+ 1691931844
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e0fbaa20-39d9-11ee-b92b-37d2cd449a32
+
+
+
diff --git a/graph/incidents_graphml/e/e0ff2f60-71ba-11ee-ba6f-c94c097ae35c.graphml b/graph/incidents_graphml/e/e0ff2f60-71ba-11ee-ba6f-c94c097ae35c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..800b992eb5046dc6b72d6c4e6e148ccecf14aa04
--- /dev/null
+++ b/graph/incidents_graphml/e/e0ff2f60-71ba-11ee-ba6f-c94c097ae35c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.216.198
+ 172.25.216.198
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.87.128
+ 100.64.87.128
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1698075794
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e0ff2f60-71ba-11ee-ba6f-c94c097ae35c
+
+
+
diff --git a/graph/incidents_graphml/e/e1000030-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e1000030-6b0b-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1bf76cf454e8c6bbc7a341afd219948eaad9899d
--- /dev/null
+++ b/graph/incidents_graphml/e/e1000030-6b0b-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.234
+ 100.64.66.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697340925
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e1000030-6b0b-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/e/e1021980-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e1021980-6fe1-11ee-ab93-b9aa077096ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5bde85e68141946b9836b12fd8ec56fc76218776
--- /dev/null
+++ b/graph/incidents_graphml/e/e1021980-6fe1-11ee-ab93-b9aa077096ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.33
+ 100.64.17.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697872642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1021980-6fe1-11ee-ab93-b9aa077096ae
+
+
+
diff --git a/graph/incidents_graphml/e/e10e5920-56b4-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/e/e10e5920-56b4-11ee-be44-f1fe26834d88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb49f885cabbe9b5c106ff33ae1b3bd2429f2664
--- /dev/null
+++ b/graph/incidents_graphml/e/e10e5920-56b4-11ee-be44-f1fe26834d88.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.22.167
+ 100.64.22.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.46
+ 100.64.69.46
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695104536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e10e5920-56b4-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695104536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e10e5920-56b4-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695104536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e10e5920-56b4-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695104536
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e10e5920-56b4-11ee-be44-f1fe26834d88
+
+
+
diff --git a/graph/incidents_graphml/e/e113ccc0-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e113ccc0-6fe1-11ee-ab93-b9aa077096ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bbaff1924e344c9bb403e53fa214c136cd72f443
--- /dev/null
+++ b/graph/incidents_graphml/e/e113ccc0-6fe1-11ee-ab93-b9aa077096ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.33
+ 100.64.17.33
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697872643
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e113ccc0-6fe1-11ee-ab93-b9aa077096ae
+
+
+
diff --git a/graph/incidents_graphml/e/e115bcb0-ed78-11ed-a662-a9c0e7c292a4.graphml b/graph/incidents_graphml/e/e115bcb0-ed78-11ed-a662-a9c0e7c292a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cec1f19e65569119597883bd90c1915dead99adf
--- /dev/null
+++ b/graph/incidents_graphml/e/e115bcb0-ed78-11ed-a662-a9c0e7c292a4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.187
+ 100.64.68.187
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1683533894
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e115bcb0-ed78-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683533894
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e115bcb0-ed78-11ed-a662-a9c0e7c292a4
+
+
+
diff --git a/graph/incidents_graphml/e/e11a79d0-3dbf-11ed-af1b-23b3512944ca.graphml b/graph/incidents_graphml/e/e11a79d0-3dbf-11ed-af1b-23b3512944ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7993c6b5206d6c822317d00a3631b83c99231aa2
--- /dev/null
+++ b/graph/incidents_graphml/e/e11a79d0-3dbf-11ed-af1b-23b3512944ca.graphml
@@ -0,0 +1,828 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ CRED
+ CRED-0013
+ ["Suspicious User"]
+ 0.25
+ ["Barracuda WAF"]
+
+
+ HOST
+ 100.64.84.174
+ 100.64.84.174
+ []
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.17.248
+ 100.64.17.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.84.175
+ 100.64.84.175
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.76.90
+ 100.64.76.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.84.176
+ 100.64.84.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.79.157
+ 100.64.79.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.84.177
+ 100.64.84.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.84.178
+ 100.64.84.178
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.83.90
+ 100.64.83.90
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.84.179
+ 100.64.84.179
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.84.180
+ 100.64.84.180
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.51
+ 100.64.25.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.84.181
+ 100.64.84.181
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.84.182
+ 100.64.84.182
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.84.183
+ 100.64.84.183
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.180
+ 100.64.49.180
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.246
+ 100.64.12.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.84.184
+ 100.64.84.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.84.185
+ 100.64.84.185
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.239
+ 100.64.27.239
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.125
+ 100.64.25.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+ INCIDENT_LINK
+ 1664212984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e11a79d0-3dbf-11ed-af1b-23b3512944ca
+
+
+
diff --git a/graph/incidents_graphml/e/e11f10a0-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e11f10a0-2da4-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..afa12c37a3c63c426c7a7ca3aac96febdbaa8e53
--- /dev/null
+++ b/graph/incidents_graphml/e/e11f10a0-2da4-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.173
+ 100.64.37.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690589667
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e11f10a0-2da4-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/e/e121af70-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e121af70-6fe1-11ee-ab93-b9aa077096ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..654688a5208e5605679366db1ff7932be78931ff
--- /dev/null
+++ b/graph/incidents_graphml/e/e121af70-6fe1-11ee-ab93-b9aa077096ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.35
+ 100.64.17.35
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697872643
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e121af70-6fe1-11ee-ab93-b9aa077096ae
+
+
+
diff --git a/graph/incidents_graphml/e/e12d4440-71ba-11ee-ba6f-c94c097ae35c.graphml b/graph/incidents_graphml/e/e12d4440-71ba-11ee-ba6f-c94c097ae35c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d617efa07afaf961e141d37e9031eec76968bd77
--- /dev/null
+++ b/graph/incidents_graphml/e/e12d4440-71ba-11ee-ba6f-c94c097ae35c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.181.72.179
+ 10.181.72.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 172.24.106.87
+ 172.24.106.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1698075795
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e12d4440-71ba-11ee-ba6f-c94c097ae35c
+
+
+
diff --git a/graph/incidents_graphml/e/e1318df0-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e1318df0-6fe1-11ee-ab93-b9aa077096ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fb134c5c8b8157c2ce0ec0ed718efd545ab3fad
--- /dev/null
+++ b/graph/incidents_graphml/e/e1318df0-6fe1-11ee-ab93-b9aa077096ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.35
+ 100.64.17.35
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697872643
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e1318df0-6fe1-11ee-ab93-b9aa077096ae
+
+
+
diff --git a/graph/incidents_graphml/e/e139e8d0-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/e/e139e8d0-576b-11ee-b369-595b8ff2e388.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..964a477a62e00cc6c07f379598e1a76569b54517
--- /dev/null
+++ b/graph/incidents_graphml/e/e139e8d0-576b-11ee-b369-595b8ff2e388.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.90.5
+ 100.64.90.5
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1695183134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e139e8d0-576b-11ee-b369-595b8ff2e388
+
+
+
diff --git a/graph/incidents_graphml/e/e1488ed0-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/e/e1488ed0-576b-11ee-b369-595b8ff2e388.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88f888452d6d3c52adc0576b4c4ce561498e91ac
--- /dev/null
+++ b/graph/incidents_graphml/e/e1488ed0-576b-11ee-b369-595b8ff2e388.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.5
+ 100.64.90.5
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695183134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e1488ed0-576b-11ee-b369-595b8ff2e388
+
+
+
diff --git a/graph/incidents_graphml/e/e154b2d0-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e154b2d0-8418-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0db6b34e40383e3ff21c5c6661d2e0e85b443a2b
--- /dev/null
+++ b/graph/incidents_graphml/e/e154b2d0-8418-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.173
+ 100.64.16.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700095289
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e154b2d0-8418-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/e/e1589460-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/e/e1589460-576b-11ee-b369-595b8ff2e388.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..23f4144772ac436360d3aa7f45941713c8a88204
--- /dev/null
+++ b/graph/incidents_graphml/e/e1589460-576b-11ee-b369-595b8ff2e388.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.7
+ 100.64.90.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695183134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e1589460-576b-11ee-b369-595b8ff2e388
+
+
+
diff --git a/graph/incidents_graphml/e/e15a9380-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/e/e15a9380-3683-11ef-865b-773bd844d05a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..274a4082226af9113a1828f2b1d2a6bdbe9e64a5
--- /dev/null
+++ b/graph/incidents_graphml/e/e15a9380-3683-11ef-865b-773bd844d05a.graphml
@@ -0,0 +1,437 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.236
+ 100.64.21.236
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.237
+ 100.64.21.237
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.63
+ 100.64.8.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.238
+ 100.64.21.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.239
+ 100.64.21.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.17
+ 100.64.11.17
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.240
+ 100.64.21.240
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.241
+ 100.64.21.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.242
+ USER-0015-1232.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.243
+ 100.64.21.243
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+ INCIDENT_LINK
+ 1719712552
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e15a9380-3683-11ef-865b-773bd844d05a
+
+
+
diff --git a/graph/incidents_graphml/e/e1738280-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e1738280-6b0b-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65b45d4e202f3522f0c5982fa3256cc099eddc00
--- /dev/null
+++ b/graph/incidents_graphml/e/e1738280-6b0b-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.236
+ 100.64.66.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697340926
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1738280-6b0b-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/e/e17a8e40-fe69-11ed-a136-877286d930e4.graphml b/graph/incidents_graphml/e/e17a8e40-fe69-11ed-a136-877286d930e4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ae04ef72831d4d608fad8576cffca250b97ab68
--- /dev/null
+++ b/graph/incidents_graphml/e/e17a8e40-fe69-11ed-a136-877286d930e4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.109
+ 100.64.7.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685396622
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e17a8e40-fe69-11ed-a136-877286d930e4
+
+
+
diff --git a/graph/incidents_graphml/e/e17e5850-3a81-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/e/e17e5850-3a81-11ee-b55b-6596b150fac1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4659f47a835b01bb02f2694dbcac2647348825b1
--- /dev/null
+++ b/graph/incidents_graphml/e/e17e5850-3a81-11ee-b55b-6596b150fac1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.75
+ 100.64.7.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692004000
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e17e5850-3a81-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004000
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e17e5850-3a81-11ee-b55b-6596b150fac1
+
+
+
diff --git a/graph/incidents_graphml/e/e1822880-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e1822880-6b0b-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c61ea444fc413c4800e07fb70abdad54aed2e58
--- /dev/null
+++ b/graph/incidents_graphml/e/e1822880-6b0b-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.236
+ 100.64.66.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697340926
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e1822880-6b0b-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/e/e185b2d0-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e185b2d0-479c-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43578e38282baecb47ee8b39c084b1f302b11f18
--- /dev/null
+++ b/graph/incidents_graphml/e/e185b2d0-479c-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.175
+ 100.64.12.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693444961
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e185b2d0-479c-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/e/e18eaba0-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e18eaba0-6b0b-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..529c03f2e115c4c0f38633f9ece9725a1c5ad26f
--- /dev/null
+++ b/graph/incidents_graphml/e/e18eaba0-6b0b-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.238
+ 100.64.66.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697340926
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e18eaba0-6b0b-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/e/e1959150-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e1959150-479c-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7465e9c2b6ffec9a33be020b877ad810dca0923
--- /dev/null
+++ b/graph/incidents_graphml/e/e1959150-479c-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.185
+ 100.64.18.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693444962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1959150-479c-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/e/e19b55d0-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e19b55d0-6b0b-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..930e932ca29694664203ac0523dc299e89c94d23
--- /dev/null
+++ b/graph/incidents_graphml/e/e19b55d0-6b0b-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.238
+ 100.64.66.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697340926
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e19b55d0-6b0b-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/e/e19f3850-a812-11ee-99fc-3f84722b2bdf.graphml b/graph/incidents_graphml/e/e19f3850-a812-11ee-99fc-3f84722b2bdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5eef833aaf38d62976ea2382d5c7f85a1b41f686
--- /dev/null
+++ b/graph/incidents_graphml/e/e19f3850-a812-11ee-99fc-3f84722b2bdf.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.244
+ 100.64.68.244
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.29.127
+ 100.64.29.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ INCIDENT_LINK
+ 1704050954
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e19f3850-a812-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704050954
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e19f3850-a812-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704050954
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e19f3850-a812-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704050954
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e19f3850-a812-11ee-99fc-3f84722b2bdf
+
+
+
diff --git a/graph/incidents_graphml/e/e1b20890-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e1b20890-6fe1-11ee-ab93-b9aa077096ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a216347c4eb0208574c4acb89cbd3111505b90da
--- /dev/null
+++ b/graph/incidents_graphml/e/e1b20890-6fe1-11ee-ab93-b9aa077096ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.37
+ 100.64.17.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697872644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e1b20890-6fe1-11ee-ab93-b9aa077096ae
+
+
+
diff --git a/graph/incidents_graphml/e/e1b23810-36e8-11ee-94ff-9304c987561c.graphml b/graph/incidents_graphml/e/e1b23810-36e8-11ee-94ff-9304c987561c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c90827d7022fc75f900e10aee1cbec109d9544da
--- /dev/null
+++ b/graph/incidents_graphml/e/e1b23810-36e8-11ee-94ff-9304c987561c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.85
+ 100.64.29.85
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691608434
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e1b23810-36e8-11ee-94ff-9304c987561c
+
+
+
diff --git a/graph/incidents_graphml/e/e1b3c7b0-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e1b3c7b0-479c-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b87e44b67b08064978d6cfd4a71a3ef59ecbcf59
--- /dev/null
+++ b/graph/incidents_graphml/e/e1b3c7b0-479c-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.208
+ 100.64.51.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693444962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1b3c7b0-479c-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693444962
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1b3c7b0-479c-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/e/e1bf80d0-63d2-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/e/e1bf80d0-63d2-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b32bbda536ddcdee13e8987c40e5fd397d72bcf
--- /dev/null
+++ b/graph/incidents_graphml/e/e1bf80d0-63d2-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.151
+ 100.64.46.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696546787
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1bf80d0-63d2-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/e/e1c17960-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e1c17960-0cae-11ee-9176-191794f15128.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39c127da79d233e22becc1919d5922d985b408d3
--- /dev/null
+++ b/graph/incidents_graphml/e/e1c17960-0cae-11ee-9176-191794f15128.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.214
+ 100.64.10.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.39
+ USER-0015-1768.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.238
+ 100.64.77.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.153
+ 100.64.72.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686965574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1c17960-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1c17960-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1c17960-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1c17960-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1c17960-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965574
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1c17960-0cae-11ee-9176-191794f15128
+
+
+
diff --git a/graph/incidents_graphml/e/e1c26db0-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e1c26db0-479c-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86080029216801e8479154f6b64f92b2be43336a
--- /dev/null
+++ b/graph/incidents_graphml/e/e1c26db0-479c-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.208
+ 100.64.51.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693444962
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e1c26db0-479c-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/e/e1c6a200-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e1c6a200-6fe1-11ee-ab93-b9aa077096ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ae529f2b6a04380d198a53a3c00d86a39a63f80
--- /dev/null
+++ b/graph/incidents_graphml/e/e1c6a200-6fe1-11ee-ab93-b9aa077096ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.37
+ 100.64.17.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697872644
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1c6a200-6fe1-11ee-ab93-b9aa077096ae
+
+
+
diff --git a/graph/incidents_graphml/e/e1d070c0-63d2-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/e/e1d070c0-63d2-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44a6faca1dcf164fd083b24dba0e2277630de9a1
--- /dev/null
+++ b/graph/incidents_graphml/e/e1d070c0-63d2-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.151
+ 100.64.46.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696546787
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e1d070c0-63d2-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/e/e1db6b40-3a67-11ee-a671-291bdda64afb.graphml b/graph/incidents_graphml/e/e1db6b40-3a67-11ee-a671-291bdda64afb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a2aff903969d72635b7ee1b035c595bf904ae589
--- /dev/null
+++ b/graph/incidents_graphml/e/e1db6b40-3a67-11ee-a671-291bdda64afb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.89
+ 100.64.7.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691992834
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e1db6b40-3a67-11ee-a671-291bdda64afb
+
+
+
diff --git a/graph/incidents_graphml/e/e1e7c030-3007-11ee-bc80-5d173594d7c4.graphml b/graph/incidents_graphml/e/e1e7c030-3007-11ee-bc80-5d173594d7c4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2cfb6af4513ac2ebe92417fbadb5326d507ef4a4
--- /dev/null
+++ b/graph/incidents_graphml/e/e1e7c030-3007-11ee-bc80-5d173594d7c4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.70
+ 100.64.80.70
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690852090
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1e7c030-3007-11ee-bc80-5d173594d7c4
+
+
+
diff --git a/graph/incidents_graphml/e/e1e87540-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/e/e1e87540-13f4-11ee-9bb8-6b8312f57fd1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e8ebc2f93c85142a1331b086cd7ada939b7804e
--- /dev/null
+++ b/graph/incidents_graphml/e/e1e87540-13f4-11ee-9bb8-6b8312f57fd1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.229
+ 100.64.72.229
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.230
+ 100.64.72.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687765297
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e1e87540-13f4-11ee-9bb8-6b8312f57fd1
+
+
+ INCIDENT_LINK
+ 1687765297
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e1e87540-13f4-11ee-9bb8-6b8312f57fd1
+
+
+
diff --git a/graph/incidents_graphml/e/e1ea3040-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/e/e1ea3040-3b83-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e36c90b31bb2e419dcc8066c753eab0abc293ac6
--- /dev/null
+++ b/graph/incidents_graphml/e/e1ea3040-3b83-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.165
+ 100.64.19.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692114811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1ea3040-3b83-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/e/e1f48dc0-05a8-11ef-8a49-f14dcee941df.graphml b/graph/incidents_graphml/e/e1f48dc0-05a8-11ef-8a49-f14dcee941df.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..89540b269c8d323d345abdb35d222add3339f9e8
--- /dev/null
+++ b/graph/incidents_graphml/e/e1f48dc0-05a8-11ef-8a49-f14dcee941df.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.20.181.243
+ 172.20.181.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.99
+ 100.64.92.99
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714340837
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e1f48dc0-05a8-11ef-8a49-f14dcee941df
+
+
+ INCIDENT_LINK
+ 1714340837
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e1f48dc0-05a8-11ef-8a49-f14dcee941df
+
+
+
diff --git a/graph/incidents_graphml/e/e1fbeb90-3a67-11ee-a671-291bdda64afb.graphml b/graph/incidents_graphml/e/e1fbeb90-3a67-11ee-a671-291bdda64afb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce94ecec1880498fae2a1c94d3aea7b316748ee2
--- /dev/null
+++ b/graph/incidents_graphml/e/e1fbeb90-3a67-11ee-a671-291bdda64afb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.89
+ 100.64.7.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691992834
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e1fbeb90-3a67-11ee-a671-291bdda64afb
+
+
+
diff --git a/graph/incidents_graphml/e/e1fbfef0-f0fb-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/e/e1fbfef0-f0fb-11ee-aef3-7fbaf9d61c41.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5694ea6f68e64b05b429317f83a2fbf350d7adc9
--- /dev/null
+++ b/graph/incidents_graphml/e/e1fbfef0-f0fb-11ee-aef3-7fbaf9d61c41.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.172
+ 100.64.25.172
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712067511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e1fbfef0-f0fb-11ee-aef3-7fbaf9d61c41
+
+
+
diff --git a/graph/incidents_graphml/e/e207d630-9c29-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/e/e207d630-9c29-11ed-a223-eb3483e385f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..beba68f8dccb47f04b5ce212c357b6909b5e39a6
--- /dev/null
+++ b/graph/incidents_graphml/e/e207d630-9c29-11ed-a223-eb3483e385f1.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.132
+ 100.64.72.132
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.133
+ 100.64.72.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.134
+ 100.64.72.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.136
+ 100.64.72.136
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1674593921
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e207d630-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593921
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e207d630-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593921
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e207d630-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593921
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e207d630-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593921
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e207d630-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593921
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e207d630-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593921
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e207d630-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593921
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e207d630-9c29-11ed-a223-eb3483e385f1
+
+
+
diff --git a/graph/incidents_graphml/e/e20cd460-3007-11ee-bc80-5d173594d7c4.graphml b/graph/incidents_graphml/e/e20cd460-3007-11ee-bc80-5d173594d7c4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b578b90f893ca3567c77881bff3a21932d2f495e
--- /dev/null
+++ b/graph/incidents_graphml/e/e20cd460-3007-11ee-bc80-5d173594d7c4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.70
+ 100.64.80.70
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690852091
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e20cd460-3007-11ee-bc80-5d173594d7c4
+
+
+
diff --git a/graph/incidents_graphml/e/e213f7f0-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e213f7f0-2da4-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9421869595f528bef0e2e76cd0280a3c98030df8
--- /dev/null
+++ b/graph/incidents_graphml/e/e213f7f0-2da4-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.175
+ 100.64.37.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690589668
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e213f7f0-2da4-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/e/e2168d70-3e62-11ee-8974-9fabcbebe5d1.graphml b/graph/incidents_graphml/e/e2168d70-3e62-11ee-8974-9fabcbebe5d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..771bb63f4f7b502e25fc43bc48aaf4a0bf07f80c
--- /dev/null
+++ b/graph/incidents_graphml/e/e2168d70-3e62-11ee-8974-9fabcbebe5d1.graphml
@@ -0,0 +1,777 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.189
+ 100.64.18.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.24
+ 100.64.56.24
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.25
+ 100.64.56.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.26
+ 100.64.56.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.27
+ 100.64.56.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.133
+ 100.64.16.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.28
+ 100.64.56.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.29
+ 100.64.56.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.30
+ 100.64.56.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.252
+ 100.64.23.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.41
+ 100.64.20.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.228
+ 100.64.14.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.3
+ 100.64.50.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.105
+ 100.64.11.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.31
+ 100.64.56.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.10
+ 100.64.6.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.115
+ 100.64.29.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+ INCIDENT_LINK
+ 1692430491
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2168d70-3e62-11ee-8974-9fabcbebe5d1
+
+
+
diff --git a/graph/incidents_graphml/e/e2170ca0-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/e/e2170ca0-3b83-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5536f8f5d768b52f76d11a9d484ceafb0af63099
--- /dev/null
+++ b/graph/incidents_graphml/e/e2170ca0-3b83-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.165
+ 100.64.19.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692114811
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2170ca0-3b83-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/e/e2248ae0-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e2248ae0-479c-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..07b163afbe241d0cf0158253c5996eb8b24f4480
--- /dev/null
+++ b/graph/incidents_graphml/e/e2248ae0-479c-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.170
+ 100.64.17.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693444963
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2248ae0-479c-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693444963
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2248ae0-479c-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/e/e2273db0-3add-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/e/e2273db0-3add-11ee-a7d4-a597d065c4ef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f111438c097832dd31a857c672d5d0cdfda3cfd4
--- /dev/null
+++ b/graph/incidents_graphml/e/e2273db0-3add-11ee-a7d4-a597d065c4ef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.229
+ 100.64.55.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692043515
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2273db0-3add-11ee-a7d4-a597d065c4ef
+
+
+
diff --git a/graph/incidents_graphml/e/e232e2c0-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e232e2c0-479c-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1c04d3cb6d76123aeb5ed0f0b9951364a3a6d26
--- /dev/null
+++ b/graph/incidents_graphml/e/e232e2c0-479c-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.170
+ 100.64.17.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693444963
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e232e2c0-479c-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/e/e23326f0-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e23326f0-0cae-11ee-9176-191794f15128.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35398bbf87b79d3560834ea3ad9cf97789994ec4
--- /dev/null
+++ b/graph/incidents_graphml/e/e23326f0-0cae-11ee-9176-191794f15128.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.239
+ 100.64.77.239
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.17
+ 100.64.77.17
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.12
+ 100.64.10.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686965575
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e23326f0-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965575
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e23326f0-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965575
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e23326f0-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965575
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e23326f0-0cae-11ee-9176-191794f15128
+
+
+
diff --git a/graph/incidents_graphml/e/e23db2f0-7464-11ee-9e0a-5d8c532e858b.graphml b/graph/incidents_graphml/e/e23db2f0-7464-11ee-9e0a-5d8c532e858b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3985e750266349313939944eb784c6c56ce5f1e
--- /dev/null
+++ b/graph/incidents_graphml/e/e23db2f0-7464-11ee-9e0a-5d8c532e858b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.102
+ 100.64.16.102
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698368713
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e23db2f0-7464-11ee-9e0a-5d8c532e858b
+
+
+
diff --git a/graph/incidents_graphml/e/e2404780-258b-11ef-a290-c53279b5db02.graphml b/graph/incidents_graphml/e/e2404780-258b-11ef-a290-c53279b5db02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7608496b303328391600d60506f85b4bf2e0796b
--- /dev/null
+++ b/graph/incidents_graphml/e/e2404780-258b-11ef-a290-c53279b5db02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.106
+ 100.64.2.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717846819
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2404780-258b-11ef-a290-c53279b5db02
+
+
+
diff --git a/graph/incidents_graphml/e/e242dc00-3add-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/e/e242dc00-3add-11ee-a7d4-a597d065c4ef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8e63979211ae8b97fa606725d6b81bf8f3664a3
--- /dev/null
+++ b/graph/incidents_graphml/e/e242dc00-3add-11ee-a7d4-a597d065c4ef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.229
+ 100.64.55.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692043515
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e242dc00-3add-11ee-a7d4-a597d065c4ef
+
+
+
diff --git a/graph/incidents_graphml/e/e2442fb0-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e2442fb0-2da4-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ba14fc1acdba8d87bd8d5369c3241a22b2a5187
--- /dev/null
+++ b/graph/incidents_graphml/e/e2442fb0-2da4-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.175
+ 100.64.37.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690589669
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2442fb0-2da4-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/e/e24e7720-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e24e7720-0cae-11ee-9176-191794f15128.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4025573f25631db91c4e4f993deda30d140d164f
--- /dev/null
+++ b/graph/incidents_graphml/e/e24e7720-0cae-11ee-9176-191794f15128.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.83
+ 100.64.11.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.159
+ HOST-14709
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686965575
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e24e7720-0cae-11ee-9176-191794f15128
+
+
+ INCIDENT_LINK
+ 1686965575
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e24e7720-0cae-11ee-9176-191794f15128
+
+
+
diff --git a/graph/incidents_graphml/e/e24ff6f0-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/e/e24ff6f0-3b83-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c108a0774752b418712a2c742c095e08ce2fa1f
--- /dev/null
+++ b/graph/incidents_graphml/e/e24ff6f0-3b83-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.134
+ USER-0015-1448.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692114812
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e24ff6f0-3b83-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/e/e2541da0-258b-11ef-a290-c53279b5db02.graphml b/graph/incidents_graphml/e/e2541da0-258b-11ef-a290-c53279b5db02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ab0d21faf46519385025e63e232127b029af1c0
--- /dev/null
+++ b/graph/incidents_graphml/e/e2541da0-258b-11ef-a290-c53279b5db02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.106
+ 100.64.2.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717846820
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2541da0-258b-11ef-a290-c53279b5db02
+
+
+
diff --git a/graph/incidents_graphml/e/e25fdd30-36e8-11ee-94ff-9304c987561c.graphml b/graph/incidents_graphml/e/e25fdd30-36e8-11ee-94ff-9304c987561c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54f4a552910dea5ae319771fa7402ddb92da27d5
--- /dev/null
+++ b/graph/incidents_graphml/e/e25fdd30-36e8-11ee-94ff-9304c987561c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.87
+ 100.64.29.87
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691608435
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e25fdd30-36e8-11ee-94ff-9304c987561c
+
+
+
diff --git a/graph/incidents_graphml/e/e27ad3c0-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e27ad3c0-6973-11ee-99bd-0777ff256373.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e4f1d7edb6af4f4c1ce77d5871bca1d71ddf37b
--- /dev/null
+++ b/graph/incidents_graphml/e/e27ad3c0-6973-11ee-99bd-0777ff256373.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.146
+ 100.64.30.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697165693
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e27ad3c0-6973-11ee-99bd-0777ff256373
+
+
+
diff --git a/graph/incidents_graphml/e/e27bf0b0-36e8-11ee-94ff-9304c987561c.graphml b/graph/incidents_graphml/e/e27bf0b0-36e8-11ee-94ff-9304c987561c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27edaaecb93950db04eed9611a9be21accb6931c
--- /dev/null
+++ b/graph/incidents_graphml/e/e27bf0b0-36e8-11ee-94ff-9304c987561c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.87
+ 100.64.29.87
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691608435
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e27bf0b0-36e8-11ee-94ff-9304c987561c
+
+
+
diff --git a/graph/incidents_graphml/e/e27c6370-1814-11ef-a290-d5e92fd7ebc0.graphml b/graph/incidents_graphml/e/e27c6370-1814-11ef-a290-d5e92fd7ebc0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea68d40ecd2f91b9ea31c40a239234330db72bed
--- /dev/null
+++ b/graph/incidents_graphml/e/e27c6370-1814-11ef-a290-d5e92fd7ebc0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.87.123
+ USER-0015-2001.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716366345
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e27c6370-1814-11ef-a290-d5e92fd7ebc0
+
+
+
diff --git a/graph/incidents_graphml/e/e2825990-258b-11ef-a290-c53279b5db02.graphml b/graph/incidents_graphml/e/e2825990-258b-11ef-a290-c53279b5db02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..046b0b6f094a2f3e1ca64dd39662b1f4293acf74
--- /dev/null
+++ b/graph/incidents_graphml/e/e2825990-258b-11ef-a290-c53279b5db02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.95
+ 100.64.7.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717846820
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2825990-258b-11ef-a290-c53279b5db02
+
+
+
diff --git a/graph/incidents_graphml/e/e2862a30-3a67-11ee-a671-291bdda64afb.graphml b/graph/incidents_graphml/e/e2862a30-3a67-11ee-a671-291bdda64afb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d01ab32e80bf15b7c9ac9c58fe5ccba5d1bf61f9
--- /dev/null
+++ b/graph/incidents_graphml/e/e2862a30-3a67-11ee-a671-291bdda64afb.graphml
@@ -0,0 +1,791 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.152
+ 100.64.22.152
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.21
+ 100.64.33.21
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.22
+ USER-0015-1296.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.23
+ 100.64.33.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.59
+ 100.64.5.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.246
+ 100.64.28.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.24
+ USER-0015-1297.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.241
+ 100.64.11.241
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.176
+ 100.64.17.176
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.202
+ 100.64.20.202
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.25
+ 100.64.33.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.95
+ 100.64.12.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.26
+ 100.64.33.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.27
+ 100.64.33.27
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.203
+ 100.64.23.203
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2862a30-3a67-11ee-a671-291bdda64afb
+
+
+
diff --git a/graph/incidents_graphml/e/e28da510-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e28da510-6b0b-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f919d317fb285688e5424efd25d51b317dffcfc
--- /dev/null
+++ b/graph/incidents_graphml/e/e28da510-6b0b-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.240
+ 100.64.66.240
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697340928
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e28da510-6b0b-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/e/e290b170-258b-11ef-a290-c53279b5db02.graphml b/graph/incidents_graphml/e/e290b170-258b-11ef-a290-c53279b5db02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3a7eee8d20f07119279cfcdc71eb4ca44775127
--- /dev/null
+++ b/graph/incidents_graphml/e/e290b170-258b-11ef-a290-c53279b5db02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.95
+ 100.64.7.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717846820
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e290b170-258b-11ef-a290-c53279b5db02
+
+
+
diff --git a/graph/incidents_graphml/e/e2937950-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e2937950-479c-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c9ff6e807dbca2f2f25c408207baa23a2cbb578
--- /dev/null
+++ b/graph/incidents_graphml/e/e2937950-479c-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.210
+ 100.64.51.210
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693444963
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2937950-479c-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/e/e2976e40-dd5f-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/e/e2976e40-dd5f-11ed-8595-d92cdedd1bfb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20da40904e63e9c91bcd708975fe3454f3ce8072
--- /dev/null
+++ b/graph/incidents_graphml/e/e2976e40-dd5f-11ed-8595-d92cdedd1bfb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.58
+ 100.64.73.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.77.6
+ 100.64.77.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1681763941
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2976e40-dd5f-11ed-8595-d92cdedd1bfb
+
+
+
diff --git a/graph/incidents_graphml/e/e2a068e0-258b-11ef-a290-c53279b5db02.graphml b/graph/incidents_graphml/e/e2a068e0-258b-11ef-a290-c53279b5db02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..edbedbd04ff94d9b736d37a8b1abd3ddd37c8449
--- /dev/null
+++ b/graph/incidents_graphml/e/e2a068e0-258b-11ef-a290-c53279b5db02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.97
+ 100.64.7.97
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717846820
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2a068e0-258b-11ef-a290-c53279b5db02
+
+
+
diff --git a/graph/incidents_graphml/e/e2a1f840-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e2a1f840-479c-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52871c83103526fe2428ed8f5ceefe39b2ec664b
--- /dev/null
+++ b/graph/incidents_graphml/e/e2a1f840-479c-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.210
+ 100.64.51.210
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693444963
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2a1f840-479c-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/e/e2a523e0-3a67-11ee-a671-291bdda64afb.graphml b/graph/incidents_graphml/e/e2a523e0-3a67-11ee-a671-291bdda64afb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..222f973e9c1028ef0112d12642fc5302a37fd87a
--- /dev/null
+++ b/graph/incidents_graphml/e/e2a523e0-3a67-11ee-a671-291bdda64afb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.152
+ 100.64.22.152
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691992835
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e2a523e0-3a67-11ee-a671-291bdda64afb
+
+
+
diff --git a/graph/incidents_graphml/e/e2a907f0-2529-11ef-8cb9-83584de710c3.graphml b/graph/incidents_graphml/e/e2a907f0-2529-11ef-8cb9-83584de710c3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f41c570a973d80adfc814a98840b630a318034b
--- /dev/null
+++ b/graph/incidents_graphml/e/e2a907f0-2529-11ef-8cb9-83584de710c3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.112
+ 100.64.65.112
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717804729
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e2a907f0-2529-11ef-8cb9-83584de710c3
+
+
+
diff --git a/graph/incidents_graphml/e/e2aa9a10-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/e/e2aa9a10-3b83-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3abe8274e154a6a088bedf2f690c191e18146d37
--- /dev/null
+++ b/graph/incidents_graphml/e/e2aa9a10-3b83-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.103
+ 100.64.62.103
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692114812
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2aa9a10-3b83-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/e/e2afd230-258b-11ef-a290-c53279b5db02.graphml b/graph/incidents_graphml/e/e2afd230-258b-11ef-a290-c53279b5db02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66168f867cfc8f401381eed5f8c5c568bdaba409
--- /dev/null
+++ b/graph/incidents_graphml/e/e2afd230-258b-11ef-a290-c53279b5db02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.97
+ 100.64.7.97
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717846820
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2afd230-258b-11ef-a290-c53279b5db02
+
+
+
diff --git a/graph/incidents_graphml/e/e2b11f80-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/e/e2b11f80-5ebe-11ee-b36b-27983c746e66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6286abb0134a0dd1f27b99e4ee9f3a657ee6d8e
--- /dev/null
+++ b/graph/incidents_graphml/e/e2b11f80-5ebe-11ee-b36b-27983c746e66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.125
+ 100.64.38.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695988443
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2b11f80-5ebe-11ee-b36b-27983c746e66
+
+
+
diff --git a/graph/incidents_graphml/e/e2b2a180-1601-11ee-b5b0-23eb7b8b596d.graphml b/graph/incidents_graphml/e/e2b2a180-1601-11ee-b5b0-23eb7b8b596d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..460faa334f2321b950a4bff09b653bb97b2871ad
--- /dev/null
+++ b/graph/incidents_graphml/e/e2b2a180-1601-11ee-b5b0-23eb7b8b596d.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.32
+ 100.64.27.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.192
+ 100.64.40.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.150
+ 100.64.19.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687990785
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2b2a180-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990785
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2b2a180-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990785
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2b2a180-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990785
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2b2a180-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990785
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2b2a180-1601-11ee-b5b0-23eb7b8b596d
+
+
+ INCIDENT_LINK
+ 1687990785
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2b2a180-1601-11ee-b5b0-23eb7b8b596d
+
+
+
diff --git a/graph/incidents_graphml/e/e2b8e670-2529-11ef-8cb9-83584de710c3.graphml b/graph/incidents_graphml/e/e2b8e670-2529-11ef-8cb9-83584de710c3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7b60eb0a9845e50908486bc3f678df265d6d590
--- /dev/null
+++ b/graph/incidents_graphml/e/e2b8e670-2529-11ef-8cb9-83584de710c3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.112
+ 100.64.65.112
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717804730
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2b8e670-2529-11ef-8cb9-83584de710c3
+
+
+
diff --git a/graph/incidents_graphml/e/e2c39610-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/e/e2c39610-5ebe-11ee-b36b-27983c746e66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9151805591b75672ba6a6351b4f07c5e88f5e79c
--- /dev/null
+++ b/graph/incidents_graphml/e/e2c39610-5ebe-11ee-b36b-27983c746e66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.125
+ 100.64.38.125
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695988443
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2c39610-5ebe-11ee-b36b-27983c746e66
+
+
+
diff --git a/graph/incidents_graphml/e/e2cecf60-7464-11ee-9e0a-5d8c532e858b.graphml b/graph/incidents_graphml/e/e2cecf60-7464-11ee-9e0a-5d8c532e858b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3355be611e87b5947d00f6ded76a8c5a4203372
--- /dev/null
+++ b/graph/incidents_graphml/e/e2cecf60-7464-11ee-9e0a-5d8c532e858b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.104
+ 100.64.16.104
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698368714
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e2cecf60-7464-11ee-9e0a-5d8c532e858b
+
+
+
diff --git a/graph/incidents_graphml/e/e2d3e9c0-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/e/e2d3e9c0-5ebe-11ee-b36b-27983c746e66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5dd5b573a279d77e85fa73bbfc444c015e6e526
--- /dev/null
+++ b/graph/incidents_graphml/e/e2d3e9c0-5ebe-11ee-b36b-27983c746e66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.76
+ 100.64.7.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695988443
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2d3e9c0-5ebe-11ee-b36b-27983c746e66
+
+
+
diff --git a/graph/incidents_graphml/e/e2d8a780-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e2d8a780-2da4-11ee-a72a-b3e5c322bb35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b15073afa94084a9b3085c1cef8f77dadf07ff1
--- /dev/null
+++ b/graph/incidents_graphml/e/e2d8a780-2da4-11ee-a72a-b3e5c322bb35.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.177
+ 100.64.37.177
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690589670
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2d8a780-2da4-11ee-a72a-b3e5c322bb35
+
+
+
diff --git a/graph/incidents_graphml/e/e2d9c060-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/e/e2d9c060-3b83-11ee-a154-fb63c9fd96ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60f19c49dcc61631b77c4aaafc64f0923a208ed0
--- /dev/null
+++ b/graph/incidents_graphml/e/e2d9c060-3b83-11ee-a154-fb63c9fd96ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.103
+ 100.64.62.103
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692114812
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2d9c060-3b83-11ee-a154-fb63c9fd96ca
+
+
+
diff --git a/graph/incidents_graphml/e/e2daf520-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e2daf520-6973-11ee-99bd-0777ff256373.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ca5e7c3e33c1a30f24b65181f146fa6a4873c9e
--- /dev/null
+++ b/graph/incidents_graphml/e/e2daf520-6973-11ee-99bd-0777ff256373.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.87
+ 100.64.13.87
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2daf520-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2daf520-6973-11ee-99bd-0777ff256373
+
+
+
diff --git a/graph/incidents_graphml/e/e2db4e80-5e3e-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/e/e2db4e80-5e3e-11ed-95e5-b5536252f217.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b66e31627ef02d710100d84134b5085443c3f2db
--- /dev/null
+++ b/graph/incidents_graphml/e/e2db4e80-5e3e-11ed-95e5-b5536252f217.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.29
+ 100.64.78.29
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.85
+ 100.64.71.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.46.131
+ 100.64.46.131
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.254
+ 100.64.71.254
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.88
+ 100.64.72.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.74.15
+ 100.64.74.15
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.228
+ 100.64.71.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.104
+ 100.64.73.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667785970
+ malicious
+ 0.7626953125
+ 0.7626953125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e2db4e80-5e3e-11ed-95e5-b5536252f217
+
+
+
diff --git a/graph/incidents_graphml/e/e2e145f0-7464-11ee-9e0a-5d8c532e858b.graphml b/graph/incidents_graphml/e/e2e145f0-7464-11ee-9e0a-5d8c532e858b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..daf9223d1a5c31f09e0c39e2413cf72f7a23679a
--- /dev/null
+++ b/graph/incidents_graphml/e/e2e145f0-7464-11ee-9e0a-5d8c532e858b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.105
+ 100.64.16.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698368714
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e2e145f0-7464-11ee-9e0a-5d8c532e858b
+
+
+
diff --git a/graph/incidents_graphml/e/e2e35310-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/e/e2e35310-5ebe-11ee-b36b-27983c746e66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..47c34d113bed6942c61f439cad6dbe8bf52a6f7e
--- /dev/null
+++ b/graph/incidents_graphml/e/e2e35310-5ebe-11ee-b36b-27983c746e66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.76
+ 100.64.7.76
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695988443
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2e35310-5ebe-11ee-b36b-27983c746e66
+
+
+
diff --git a/graph/incidents_graphml/e/e2e43250-60bf-11ee-8be9-71423a8fe595.graphml b/graph/incidents_graphml/e/e2e43250-60bf-11ee-8be9-71423a8fe595.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca940835506686d1ca0810f24c64433850a4d40b
--- /dev/null
+++ b/graph/incidents_graphml/e/e2e43250-60bf-11ee-8be9-71423a8fe595.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.82
+ 100.64.54.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696208775
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2e43250-60bf-11ee-8be9-71423a8fe595
+
+
+
diff --git a/graph/incidents_graphml/e/e2e5ae60-9674-11ee-ab9f-854a086fd880.graphml b/graph/incidents_graphml/e/e2e5ae60-9674-11ee-ab9f-854a086fd880.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2614c98f7345ab5db2f64b6d9e495c5837758cdb
--- /dev/null
+++ b/graph/incidents_graphml/e/e2e5ae60-9674-11ee-ab9f-854a086fd880.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.43
+ 100.64.62.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.23
+ 100.64.28.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.44
+ 100.64.62.44
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.45
+ 100.64.62.45
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702113926
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2e5ae60-9674-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702113926
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2e5ae60-9674-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702113926
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2e5ae60-9674-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702113926
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2e5ae60-9674-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702113926
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2e5ae60-9674-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702113926
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2e5ae60-9674-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702113926
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2e5ae60-9674-11ee-ab9f-854a086fd880
+
+
+ INCIDENT_LINK
+ 1702113926
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2e5ae60-9674-11ee-ab9f-854a086fd880
+
+
+
diff --git a/graph/incidents_graphml/e/e2f39ba0-60bf-11ee-8be9-71423a8fe595.graphml b/graph/incidents_graphml/e/e2f39ba0-60bf-11ee-8be9-71423a8fe595.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c783cc889f7a54737a0f948627fe7109e26b865
--- /dev/null
+++ b/graph/incidents_graphml/e/e2f39ba0-60bf-11ee-8be9-71423a8fe595.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.82
+ 100.64.54.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696208775
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2f39ba0-60bf-11ee-8be9-71423a8fe595
+
+
+
diff --git a/graph/incidents_graphml/e/e2f95290-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e2f95290-6973-11ee-99bd-0777ff256373.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5a9172852a07d9ab18a570a3452336c6de54b40
--- /dev/null
+++ b/graph/incidents_graphml/e/e2f95290-6973-11ee-99bd-0777ff256373.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.87
+ 100.64.13.87
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e2f95290-6973-11ee-99bd-0777ff256373
+
+
+
diff --git a/graph/incidents_graphml/e/e2ffa8a0-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e2ffa8a0-479c-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..665d9af667b4a30a0a00959052e7a4acd514241f
--- /dev/null
+++ b/graph/incidents_graphml/e/e2ffa8a0-479c-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.236
+ 100.64.37.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693444964
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e2ffa8a0-479c-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/e/e306c010-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e306c010-6973-11ee-99bd-0777ff256373.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9dc0aa8592f9211ad2f545791a2ad0ac0254d5e7
--- /dev/null
+++ b/graph/incidents_graphml/e/e306c010-6973-11ee-99bd-0777ff256373.graphml
@@ -0,0 +1,417 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.34
+ 100.64.51.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.22
+ 100.64.16.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.169
+ 100.64.19.169
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.35
+ 100.64.51.35
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.210
+ 100.64.29.210
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.36
+ 100.64.51.36
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.38
+ 100.64.32.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.250
+ 100.64.36.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.37
+ 100.64.51.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.38
+ 100.64.51.38
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.191
+ 100.64.9.191
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e306c010-6973-11ee-99bd-0777ff256373
+
+
+
diff --git a/graph/incidents_graphml/e/e308a2a0-097d-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/e/e308a2a0-097d-11ee-8b37-9ba18759a170.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b180072d4a52c1f1d0284693c433a8a21c99d7df
--- /dev/null
+++ b/graph/incidents_graphml/e/e308a2a0-097d-11ee-8b37-9ba18759a170.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.163
+ 100.64.14.163
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1686614677
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e308a2a0-097d-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614677
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e308a2a0-097d-11ee-8b37-9ba18759a170
+
+
+
diff --git a/graph/incidents_graphml/e/e30f3120-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e30f3120-6b0b-11ee-a565-4f025efe2b34.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9910389b497601ff3552f6a13309067a55014ed
--- /dev/null
+++ b/graph/incidents_graphml/e/e30f3120-6b0b-11ee-a565-4f025efe2b34.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.129
+ 100.64.9.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697340929
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e30f3120-6b0b-11ee-a565-4f025efe2b34
+
+
+
diff --git a/graph/incidents_graphml/e/e31517f0-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e31517f0-6973-11ee-99bd-0777ff256373.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfdf2e38da6f7f6d8049c249a19e76467a84743d
--- /dev/null
+++ b/graph/incidents_graphml/e/e31517f0-6973-11ee-99bd-0777ff256373.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.34
+ 100.64.51.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697165694
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e31517f0-6973-11ee-99bd-0777ff256373
+
+
+
diff --git a/graph/incidents_graphml/e/e319fea0-3007-11ee-bc80-5d173594d7c4.graphml b/graph/incidents_graphml/e/e319fea0-3007-11ee-bc80-5d173594d7c4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b1722dc489d0129fbc9ddad2bf5bd01cad0b067a
--- /dev/null
+++ b/graph/incidents_graphml/e/e319fea0-3007-11ee-bc80-5d173594d7c4.graphml
@@ -0,0 +1,121 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.173
+ 100.64.12.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.118
+ 100.64.72.118
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.11.151
+ 100.64.11.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.82
+ 100.64.73.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690852093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e319fea0-3007-11ee-bc80-5d173594d7c4
+
+
+ INCIDENT_LINK
+ 1690852093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e319fea0-3007-11ee-bc80-5d173594d7c4
+
+
+ INCIDENT_LINK
+ 1690852093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e319fea0-3007-11ee-bc80-5d173594d7c4
+
+
+ INCIDENT_LINK
+ 1690852093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e319fea0-3007-11ee-bc80-5d173594d7c4
+
+
+
diff --git a/graph/incidents_graphml/e/e31d2910-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/e/e31d2910-6232-11ee-a972-e59ec7ee05b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9cdb2383e90ab533062103a220149ed3937399fc
--- /dev/null
+++ b/graph/incidents_graphml/e/e31d2910-6232-11ee-a972-e59ec7ee05b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.252
+ 100.64.13.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696368119
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e31d2910-6232-11ee-a972-e59ec7ee05b9
+
+
+
diff --git a/graph/incidents_graphml/e/e3319b70-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/e/e3319b70-6232-11ee-a972-e59ec7ee05b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fa2a9a7091e706799d59ef22d163cd8c2bd218d
--- /dev/null
+++ b/graph/incidents_graphml/e/e3319b70-6232-11ee-a972-e59ec7ee05b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.252
+ 100.64.13.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696368119
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e3319b70-6232-11ee-a972-e59ec7ee05b9
+
+
+
diff --git a/graph/incidents_graphml/e/e334bbb0-63d2-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/e/e334bbb0-63d2-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0eede6ca8f6e6a31ed5f0d02ac0c26ed763ffab1
--- /dev/null
+++ b/graph/incidents_graphml/e/e334bbb0-63d2-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.180
+ 100.64.67.180
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696546790
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e334bbb0-63d2-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/e/e339c330-54c8-11ee-83d2-a73a71ba6c5b.graphml b/graph/incidents_graphml/e/e339c330-54c8-11ee-83d2-a73a71ba6c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b7c5fec7fc4b69e8a2372bf02333b0169eca375
--- /dev/null
+++ b/graph/incidents_graphml/e/e339c330-54c8-11ee-83d2-a73a71ba6c5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.47
+ 100.64.34.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694893227
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e339c330-54c8-11ee-83d2-a73a71ba6c5b
+
+
+
diff --git a/graph/incidents_graphml/e/e33be960-9c29-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/e/e33be960-9c29-11ed-a223-eb3483e385f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5b7e310b4f0603f4a49755bba1f304a8db9c95e
--- /dev/null
+++ b/graph/incidents_graphml/e/e33be960-9c29-11ed-a223-eb3483e385f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.137
+ 100.64.72.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.138
+ 100.64.72.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1674593923
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e33be960-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593923
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e33be960-9c29-11ed-a223-eb3483e385f1
+
+
+
diff --git a/graph/incidents_graphml/e/e33d8450-299c-11ed-a614-6fadee11a89c.graphml b/graph/incidents_graphml/e/e33d8450-299c-11ed-a614-6fadee11a89c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65e77a07a9a5e89a8fec02b31d2c22dc5cd1c2fc
--- /dev/null
+++ b/graph/incidents_graphml/e/e33d8450-299c-11ed-a614-6fadee11a89c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.153
+ 100.64.9.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661998932
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e33d8450-299c-11ed-a614-6fadee11a89c
+
+
+
diff --git a/graph/incidents_graphml/e/e3422930-63d2-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/e/e3422930-63d2-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3701d601640e193225a988651ca9ef546ef5041b
--- /dev/null
+++ b/graph/incidents_graphml/e/e3422930-63d2-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.180
+ 100.64.67.180
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696546790
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e3422930-63d2-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/e/e34c2970-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/e/e34c2970-43ac-11ef-a622-2be670a61274.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a42929ed7ceb65e765eea057ded9918728e5211e
--- /dev/null
+++ b/graph/incidents_graphml/e/e34c2970-43ac-11ef-a622-2be670a61274.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.2
+ 100.64.38.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.3
+ 100.64.38.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721159530
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e34c2970-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159530
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e34c2970-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159530
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e34c2970-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159530
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e34c2970-43ac-11ef-a622-2be670a61274
+
+
+
diff --git a/graph/incidents_graphml/e/e350f640-63d2-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/e/e350f640-63d2-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c5c4da71bad4eaa55a080bcd039af5647e15ca0
--- /dev/null
+++ b/graph/incidents_graphml/e/e350f640-63d2-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.181
+ 100.64.67.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696546790
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e350f640-63d2-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/e/e35cabf0-fa5c-11ed-b0cc-bb4b118b8ff6.graphml b/graph/incidents_graphml/e/e35cabf0-fa5c-11ed-b0cc-bb4b118b8ff6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e7ad70f939b254f7e017a6965aaa6dbf3be336e
--- /dev/null
+++ b/graph/incidents_graphml/e/e35cabf0-fa5c-11ed-b0cc-bb4b118b8ff6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.225
+ 100.64.70.225
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","Azure Security","Advanced Malware Protection (AMP)"]
+
+
+ INCIDENT_LINK
+ 1684951237
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ e35cabf0-fa5c-11ed-b0cc-bb4b118b8ff6
+
+
+
diff --git a/graph/incidents_graphml/e/e35e3cb0-63d2-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/e/e35e3cb0-63d2-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a423f3da6f091c6d7668ef1ca3eff32b23ceff25
--- /dev/null
+++ b/graph/incidents_graphml/e/e35e3cb0-63d2-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.181
+ 100.64.67.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696546790
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e35e3cb0-63d2-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/e/e35fe8d0-54c8-11ee-83d2-a73a71ba6c5b.graphml b/graph/incidents_graphml/e/e35fe8d0-54c8-11ee-83d2-a73a71ba6c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6604443d67fbae13dd73f6293726a4704f33e5be
--- /dev/null
+++ b/graph/incidents_graphml/e/e35fe8d0-54c8-11ee-83d2-a73a71ba6c5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.49
+ 100.64.34.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694893228
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e35fe8d0-54c8-11ee-83d2-a73a71ba6c5b
+
+
+
diff --git a/graph/incidents_graphml/e/e3622680-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e3622680-6973-11ee-99bd-0777ff256373.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0601d5e4833a7c1abaad6a18eacdd37ec3ecc5a
--- /dev/null
+++ b/graph/incidents_graphml/e/e3622680-6973-11ee-99bd-0777ff256373.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.35
+ 100.64.25.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697165695
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e3622680-6973-11ee-99bd-0777ff256373
+
+
+
diff --git a/graph/incidents_graphml/e/e36fc750-54c8-11ee-83d2-a73a71ba6c5b.graphml b/graph/incidents_graphml/e/e36fc750-54c8-11ee-83d2-a73a71ba6c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f51fcb39872743cfc28c520020b1b9242efb7e5
--- /dev/null
+++ b/graph/incidents_graphml/e/e36fc750-54c8-11ee-83d2-a73a71ba6c5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.49
+ 100.64.34.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694893228
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e36fc750-54c8-11ee-83d2-a73a71ba6c5b
+
+
+
diff --git a/graph/incidents_graphml/e/e372c850-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e372c850-6973-11ee-99bd-0777ff256373.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..048618c1214034eb578362fe37836926e0631a44
--- /dev/null
+++ b/graph/incidents_graphml/e/e372c850-6973-11ee-99bd-0777ff256373.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.35
+ 100.64.25.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697165695
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e372c850-6973-11ee-99bd-0777ff256373
+
+
+
diff --git a/graph/incidents_graphml/e/e3815910-dd5f-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/e/e3815910-dd5f-11ed-8595-d92cdedd1bfb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ceb5684a5e8a561f7c8bb96316e13f1f3140a63c
--- /dev/null
+++ b/graph/incidents_graphml/e/e3815910-dd5f-11ed-8595-d92cdedd1bfb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.148
+ 100.64.80.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681763942
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e3815910-dd5f-11ed-8595-d92cdedd1bfb
+
+
+
diff --git a/graph/incidents_graphml/e/e3833b00-0676-11ee-8a7a-dfec82f23e60.graphml b/graph/incidents_graphml/e/e3833b00-0676-11ee-8a7a-dfec82f23e60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12440b4ed58ce7046ea234750de2cf3e3380c7bd
--- /dev/null
+++ b/graph/incidents_graphml/e/e3833b00-0676-11ee-8a7a-dfec82f23e60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.56
+ 100.64.57.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686281819
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e3833b00-0676-11ee-8a7a-dfec82f23e60
+
+
+
diff --git a/graph/incidents_graphml/e/e38550b0-dd5f-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/e/e38550b0-dd5f-11ed-8595-d92cdedd1bfb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b03ac53c5b46e2e6e04cfacc05d41dcf46e1f107
--- /dev/null
+++ b/graph/incidents_graphml/e/e38550b0-dd5f-11ed-8595-d92cdedd1bfb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.80.148
+ 100.64.80.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681763942
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e38550b0-dd5f-11ed-8595-d92cdedd1bfb
+
+
+
diff --git a/graph/incidents_graphml/e/e38c0b10-60bf-11ee-8be9-71423a8fe595.graphml b/graph/incidents_graphml/e/e38c0b10-60bf-11ee-8be9-71423a8fe595.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88527b32f15aa246ace661a9e152ac07b4ba4b65
--- /dev/null
+++ b/graph/incidents_graphml/e/e38c0b10-60bf-11ee-8be9-71423a8fe595.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.211
+ 100.64.23.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696208776
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e38c0b10-60bf-11ee-8be9-71423a8fe595
+
+
+
diff --git a/graph/incidents_graphml/e/e39b2640-60bf-11ee-8be9-71423a8fe595.graphml b/graph/incidents_graphml/e/e39b2640-60bf-11ee-8be9-71423a8fe595.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..403d1d7f66631f159a960535995bf475ac265a84
--- /dev/null
+++ b/graph/incidents_graphml/e/e39b2640-60bf-11ee-8be9-71423a8fe595.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.211
+ 100.64.23.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696208776
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e39b2640-60bf-11ee-8be9-71423a8fe595
+
+
+
diff --git a/graph/incidents_graphml/e/e39f74a0-53dd-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/e/e39f74a0-53dd-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb0bc876ef01cbaad8ce7d1fd4d982abf6cbefd2
--- /dev/null
+++ b/graph/incidents_graphml/e/e39f74a0-53dd-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.157
+ 100.64.14.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694792296
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e39f74a0-53dd-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/e/e3a7e6c0-3007-11ee-bc80-5d173594d7c4.graphml b/graph/incidents_graphml/e/e3a7e6c0-3007-11ee-bc80-5d173594d7c4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b32f4bb7e99b22b34d05661f06bdf5ad7b78977
--- /dev/null
+++ b/graph/incidents_graphml/e/e3a7e6c0-3007-11ee-bc80-5d173594d7c4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.72
+ 100.64.80.72
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690852093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e3a7e6c0-3007-11ee-bc80-5d173594d7c4
+
+
+
diff --git a/graph/incidents_graphml/e/e3a9aec0-0676-11ee-8a7a-dfec82f23e60.graphml b/graph/incidents_graphml/e/e3a9aec0-0676-11ee-8a7a-dfec82f23e60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7709ca331779a230cf8be1b4ffebedf6d734905b
--- /dev/null
+++ b/graph/incidents_graphml/e/e3a9aec0-0676-11ee-8a7a-dfec82f23e60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.56
+ 100.64.57.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686281819
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e3a9aec0-0676-11ee-8a7a-dfec82f23e60
+
+
+
diff --git a/graph/incidents_graphml/e/e3b297e0-1a8c-11ee-a9ef-735ae64b5bd4.graphml b/graph/incidents_graphml/e/e3b297e0-1a8c-11ee-a9ef-735ae64b5bd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48936581db22654f213f71c5af7387be8df9499f
--- /dev/null
+++ b/graph/incidents_graphml/e/e3b297e0-1a8c-11ee-a9ef-735ae64b5bd4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.128.62
+ 192.168.128.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.0.105
+ 100.64.0.105
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688490291
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e3b297e0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490291
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e3b297e0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+
diff --git a/graph/incidents_graphml/e/e3b2d590-53dd-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/e/e3b2d590-53dd-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca3a51a07ee20e3c6c5bf47998aca971333e3554
--- /dev/null
+++ b/graph/incidents_graphml/e/e3b2d590-53dd-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.157
+ 100.64.14.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694792296
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e3b2d590-53dd-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/e/e3b50db0-54c8-11ee-83d2-a73a71ba6c5b.graphml b/graph/incidents_graphml/e/e3b50db0-54c8-11ee-83d2-a73a71ba6c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..539741343460ff80cc0505cb66529830c914f26c
--- /dev/null
+++ b/graph/incidents_graphml/e/e3b50db0-54c8-11ee-83d2-a73a71ba6c5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.51
+ 100.64.34.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694893228
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e3b50db0-54c8-11ee-83d2-a73a71ba6c5b
+
+
+
diff --git a/graph/incidents_graphml/e/e3c3c580-53dd-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/e/e3c3c580-53dd-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ddf9b73786b839dd34035d6e421ac0021863356
--- /dev/null
+++ b/graph/incidents_graphml/e/e3c3c580-53dd-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.157
+ 100.64.14.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694792296
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e3c3c580-53dd-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/e/e3c53a50-54c8-11ee-83d2-a73a71ba6c5b.graphml b/graph/incidents_graphml/e/e3c53a50-54c8-11ee-83d2-a73a71ba6c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d45b882d668999870492ce473c448b7823b5d692
--- /dev/null
+++ b/graph/incidents_graphml/e/e3c53a50-54c8-11ee-83d2-a73a71ba6c5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.53
+ 100.64.34.53
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694893228
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e3c53a50-54c8-11ee-83d2-a73a71ba6c5b
+
+
+
diff --git a/graph/incidents_graphml/e/e3c559d0-3007-11ee-bc80-5d173594d7c4.graphml b/graph/incidents_graphml/e/e3c559d0-3007-11ee-bc80-5d173594d7c4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c42f5515f6d6345cb9eef0db6172a194cf2c15dc
--- /dev/null
+++ b/graph/incidents_graphml/e/e3c559d0-3007-11ee-bc80-5d173594d7c4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.72
+ 100.64.80.72
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690852094
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e3c559d0-3007-11ee-bc80-5d173594d7c4
+
+
+
diff --git a/graph/incidents_graphml/e/e3d47c90-54c8-11ee-83d2-a73a71ba6c5b.graphml b/graph/incidents_graphml/e/e3d47c90-54c8-11ee-83d2-a73a71ba6c5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58dc87b519c8691a25c565488fa44b53edd2560d
--- /dev/null
+++ b/graph/incidents_graphml/e/e3d47c90-54c8-11ee-83d2-a73a71ba6c5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.53
+ 100.64.34.53
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694893228
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e3d47c90-54c8-11ee-83d2-a73a71ba6c5b
+
+
+
diff --git a/graph/incidents_graphml/e/e3d4b570-53dd-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/e/e3d4b570-53dd-11ee-b407-311666e984f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7bfc66f0933c68cf5e06bf2cd44e4b19a3afdc9
--- /dev/null
+++ b/graph/incidents_graphml/e/e3d4b570-53dd-11ee-b407-311666e984f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.157
+ 100.64.14.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694792297
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ e3d4b570-53dd-11ee-b407-311666e984f5
+
+
+
diff --git a/graph/incidents_graphml/e/e3d7acd0-3add-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/e/e3d7acd0-3add-11ee-a7d4-a597d065c4ef.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4057227fd83ac28d186b4184d37b9ea5a33ade1
--- /dev/null
+++ b/graph/incidents_graphml/e/e3d7acd0-3add-11ee-a7d4-a597d065c4ef.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.149
+ 100.64.21.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692043518
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e3d7acd0-3add-11ee-a7d4-a597d065c4ef
+
+
+
diff --git a/graph/incidents_graphml/e/e3d85220-9b05-11ed-8216-d3cecd9ec3aa.graphml b/graph/incidents_graphml/e/e3d85220-9b05-11ed-8216-d3cecd9ec3aa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d189feb86042863d20f29e5bd7377092721f6718
--- /dev/null
+++ b/graph/incidents_graphml/e/e3d85220-9b05-11ed-8216-d3cecd9ec3aa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.189
+ 100.64.55.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1968.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1674468511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ e3d85220-9b05-11ed-8216-d3cecd9ec3aa
+
+
+
diff --git a/graph/incidents_graphml/e/e3d961e0-9c29-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/e/e3d961e0-9c29-11ed-a223-eb3483e385f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2396f284b9e031bcadc9583a93174223809cddb7
--- /dev/null
+++ b/graph/incidents_graphml/e/e3d961e0-9c29-11ed-a223-eb3483e385f1.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.68
+ 100.64.20.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.51
+ 100.64.1.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.139
+ 100.64.72.139
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1674593924
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e3d961e0-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593924
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e3d961e0-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593924
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e3d961e0-9c29-11ed-a223-eb3483e385f1
+
+
+ INCIDENT_LINK
+ 1674593924
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ e3d961e0-9c29-11ed-a223-eb3483e385f1
+
+
+
diff --git a/graph/incidents_graphml/e/e3dafe10-68c5-11ee-988d-f7248eee7e4c.graphml b/graph/incidents_graphml/e/e3dafe10-68c5-11ee-988d-f7248eee7e4c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27a1bd2424dd8a125d1c452c08a9de517144c0cc
--- /dev/null
+++ b/graph/incidents_graphml/e/e3dafe10-68c5-11ee-988d-f7248eee7e4c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.197
+ 100.64.43.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697090963
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e3dafe10-68c5-11ee-988d-f7248eee7e4c
+
+
+
diff --git a/graph/incidents_graphml/e/e3db8670-9b05-11ed-8216-d3cecd9ec3aa.graphml b/graph/incidents_graphml/e/e3db8670-9b05-11ed-8216-d3cecd9ec3aa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b8be4aa5f19dcc296c3871cd4d441b0b45fd4d1
--- /dev/null
+++ b/graph/incidents_graphml/e/e3db8670-9b05-11ed-8216-d3cecd9ec3aa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1968.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.55.189
+ 100.64.55.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1674468511
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ e3db8670-9b05-11ed-8216-d3cecd9ec3aa
+
+
+