diff --git a/graph/incidents_graphml/d/d7b3a7b0-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/d7b3a7b0-b752-11ed-808d-57d97cd084e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d2f6ee5cf290150a181444d7f82e98de8740021 --- /dev/null +++ b/graph/incidents_graphml/d/d7b3a7b0-b752-11ed-808d-57d97cd084e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.92.136 + 100.64.92.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677580195 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d7b3a7b0-b752-11ed-808d-57d97cd084e1 + + + diff --git a/graph/incidents_graphml/d/d7b618b0-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/d7b618b0-b752-11ed-808d-57d97cd084e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2360c44cb0ee971c0849ba100af4c2ebb92030d5 --- /dev/null +++ b/graph/incidents_graphml/d/d7b618b0-b752-11ed-808d-57d97cd084e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.77 + 100.64.4.77 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1677580195 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d7b618b0-b752-11ed-808d-57d97cd084e1 + + + diff --git a/graph/incidents_graphml/d/d7ba1050-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/d7ba1050-b752-11ed-808d-57d97cd084e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d00ae5f78a07335cf7ef7aadd713f8732c3ba510 --- /dev/null +++ b/graph/incidents_graphml/d/d7ba1050-b752-11ed-808d-57d97cd084e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.4.77 + 100.64.4.77 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677580195 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d7ba1050-b752-11ed-808d-57d97cd084e1 + + + diff --git a/graph/incidents_graphml/d/d7ba4a50-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/d7ba4a50-0cb8-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2139c443713d2dc56edf617d2643da6c5d0264b6 --- /dev/null +++ b/graph/incidents_graphml/d/d7ba4a50-0cb8-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.218 + 100.64.23.218 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686969853 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d7ba4a50-0cb8-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/d/d7c03b40-0983-11ef-a068-8dbaaaaf6c28.graphml b/graph/incidents_graphml/d/d7c03b40-0983-11ef-a068-8dbaaaaf6c28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..afb2f71d5cea17276604bf68292b880c42d93538 --- /dev/null +++ b/graph/incidents_graphml/d/d7c03b40-0983-11ef-a068-8dbaaaaf6c28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.127 + 100.64.4.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714764733 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d7c03b40-0983-11ef-a068-8dbaaaaf6c28 + + + diff --git a/graph/incidents_graphml/d/d7c35f20-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/d7c35f20-b752-11ed-808d-57d97cd084e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ffce4354de6f86bafbe601dcfb48272c42b24d9 --- /dev/null +++ b/graph/incidents_graphml/d/d7c35f20-b752-11ed-808d-57d97cd084e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.138 + 100.64.92.138 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677580195 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7c35f20-b752-11ed-808d-57d97cd084e1 + + + diff --git a/graph/incidents_graphml/d/d7c63050-dfa2-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/d/d7c63050-dfa2-11ee-9120-ff7b7094ac3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..611d2a2402697dee7e1c3aa8effb506e700b8bdc --- /dev/null +++ b/graph/incidents_graphml/d/d7c63050-dfa2-11ee-9120-ff7b7094ac3d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.152 + 100.64.22.152 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1710160099 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7c63050-dfa2-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710160099 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d7c63050-dfa2-11ee-9120-ff7b7094ac3d + + + diff --git a/graph/incidents_graphml/d/d7cdf810-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d7cdf810-17ea-11ee-98ae-3df0911cfade.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f4b5dcaef236e4c631bb3160e955321a5b06c1a --- /dev/null +++ b/graph/incidents_graphml/d/d7cdf810-17ea-11ee-98ae-3df0911cfade.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.27 + 100.64.78.27 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688200790 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7cdf810-17ea-11ee-98ae-3df0911cfade + + + diff --git a/graph/incidents_graphml/d/d7d05840-6bcc-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/d/d7d05840-6bcc-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f427240ead3e9bc93e1e5e3c0dea941de5ef3c9 --- /dev/null +++ b/graph/incidents_graphml/d/d7d05840-6bcc-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.255 + 100.64.54.255 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697423803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7d05840-6bcc-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/d/d7dc9590-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d7dc9590-f058-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6cbff0988de5c13e8304471b343dad9cafc23020 --- /dev/null +++ b/graph/incidents_graphml/d/d7dc9590-f058-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.22 + USER-0015-1296.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711997486 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d7dc9590-f058-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/d/d7e02080-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d7e02080-17ea-11ee-98ae-3df0911cfade.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4b088abf6b691cc3b2636427e2a640fd3f490c1a --- /dev/null +++ b/graph/incidents_graphml/d/d7e02080-17ea-11ee-98ae-3df0911cfade.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.27 + 100.64.78.27 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688200790 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d7e02080-17ea-11ee-98ae-3df0911cfade + + + diff --git a/graph/incidents_graphml/d/d7e19650-6bcc-11ee-ac23-0990c4be3eac.graphml b/graph/incidents_graphml/d/d7e19650-6bcc-11ee-ac23-0990c4be3eac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cba04311a5ce63cfb5df9198de762d4fef75e67c --- /dev/null +++ b/graph/incidents_graphml/d/d7e19650-6bcc-11ee-ac23-0990c4be3eac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.255 + 100.64.54.255 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697423803 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d7e19650-6bcc-11ee-ac23-0990c4be3eac + + + diff --git a/graph/incidents_graphml/d/d7eff680-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d7eff680-f058-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a137d5a42dbf5729630654ded21747e09f767256 --- /dev/null +++ b/graph/incidents_graphml/d/d7eff680-f058-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.225 + 100.64.35.225 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711997486 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d7eff680-f058-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/d/d7f41db0-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d7f41db0-17ea-11ee-98ae-3df0911cfade.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7218aba8ae6bc50f2ac05a235f3989a823fc3513 --- /dev/null +++ b/graph/incidents_graphml/d/d7f41db0-17ea-11ee-98ae-3df0911cfade.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.60 + 100.64.74.60 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688200790 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7f41db0-17ea-11ee-98ae-3df0911cfade + + + diff --git a/graph/incidents_graphml/d/d7f54480-2111-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/d/d7f54480-2111-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..475600fa423f625e108799b7b3538c8556b111ce --- /dev/null +++ b/graph/incidents_graphml/d/d7f54480-2111-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.146 + 100.64.48.146 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689207101 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d7f54480-2111-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/d/d7ff86e0-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d7ff86e0-f058-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c88396cae2e9926e53a2e9f5bd50884d4bbaa15f --- /dev/null +++ b/graph/incidents_graphml/d/d7ff86e0-f058-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.110 + 100.64.8.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711997486 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d7ff86e0-f058-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/d/d80540f0-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/d80540f0-9562-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35b2a3d636107407297664115978f052061ea8a1 --- /dev/null +++ b/graph/incidents_graphml/d/d80540f0-9562-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.34 + 100.64.18.34 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.253 + 100.64.70.253 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.76.246 + 100.64.76.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1673848728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d80540f0-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d80540f0-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d80540f0-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d80540f0-9562-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/d/d807d900-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/d807d900-9562-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..868362c4018e937ae839a4faba2fb90ff462dc4b --- /dev/null +++ b/graph/incidents_graphml/d/d807d900-9562-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.162 + 100.64.78.162 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.170 + 100.64.72.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.78.163 + 100.64.78.163 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1673848728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d807d900-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d807d900-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d807d900-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d807d900-9562-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/d/d80c1280-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d80c1280-17ea-11ee-98ae-3df0911cfade.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44de0b82abc54c63b1a1c4e8338808406fbf34f8 --- /dev/null +++ b/graph/incidents_graphml/d/d80c1280-17ea-11ee-98ae-3df0911cfade.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.60 + 100.64.74.60 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688200791 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d80c1280-17ea-11ee-98ae-3df0911cfade + + + diff --git a/graph/incidents_graphml/d/d80c1e10-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/d80c1e10-d3dd-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ddf7a0d6543bdd513533670b6cf64dd049a69ec8 --- /dev/null +++ b/graph/incidents_graphml/d/d80c1e10-d3dd-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.152 + 100.64.5.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708866026 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d80c1e10-d3dd-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/d/d8125d30-5308-11ee-b63c-1beb4899e6f1.graphml b/graph/incidents_graphml/d/d8125d30-5308-11ee-b63c-1beb4899e6f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94ce708bdbe905c4072251dd9ff5bad88b009666 --- /dev/null +++ b/graph/incidents_graphml/d/d8125d30-5308-11ee-b63c-1beb4899e6f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.203 + 100.64.69.203 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1694700794 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8125d30-5308-11ee-b63c-1beb4899e6f1 + + + diff --git a/graph/incidents_graphml/d/d8143e30-2111-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/d/d8143e30-2111-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7cf46067e454256e89ef36b44c39b33feb107865 --- /dev/null +++ b/graph/incidents_graphml/d/d8143e30-2111-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.146 + 100.64.48.146 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689207101 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d8143e30-2111-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/d/d814bd40-fb1b-11ed-895b-69b7bcd870e2.graphml b/graph/incidents_graphml/d/d814bd40-fb1b-11ed-895b-69b7bcd870e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d847574dfbacaf70e24d350fae8bdf3ceb8525b --- /dev/null +++ b/graph/incidents_graphml/d/d814bd40-fb1b-11ed-895b-69b7bcd870e2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.102 + 100.64.51.102 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685033252 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d814bd40-fb1b-11ed-895b-69b7bcd870e2 + + + diff --git a/graph/incidents_graphml/d/d8161b80-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/d/d8161b80-a4a5-11ed-b478-67badd244434.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef98145c540d19107ba5cfe0e2b47faec8d38b26 --- /dev/null +++ b/graph/incidents_graphml/d/d8161b80-a4a5-11ed-b478-67badd244434.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.154 + 100.64.82.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.119 + 100.64.71.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1675526772 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8161b80-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526772 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8161b80-a4a5-11ed-b478-67badd244434 + + + diff --git a/graph/incidents_graphml/d/d81c0f90-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d81c0f90-f058-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e5495e8d8f56497e83996b6028a6081c90e385e --- /dev/null +++ b/graph/incidents_graphml/d/d81c0f90-f058-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711997486 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d81c0f90-f058-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/d/d81df860-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/d81df860-d3dd-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66ebbee61f5d4e71944b0b674ef35bb922fbf04b --- /dev/null +++ b/graph/incidents_graphml/d/d81df860-d3dd-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.152 + 100.64.5.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708866026 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d81df860-d3dd-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/d/d822a7a0-fe97-11ed-a08d-35e4f0a9a870.graphml b/graph/incidents_graphml/d/d822a7a0-fe97-11ed-a08d-35e4f0a9a870.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28e4d3436fa51248ce5f508d3b84f2121f175c2a --- /dev/null +++ b/graph/incidents_graphml/d/d822a7a0-fe97-11ed-a08d-35e4f0a9a870.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.238 + 100.64.21.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.46.2 + 100.64.46.2 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.43 + 100.64.7.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.3 + 100.64.46.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.46.4 + 100.64.46.4 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.167 + 100.64.18.167 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.5 + 100.64.46.5 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.6 + 100.64.46.6 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.8.112 + 100.64.8.112 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.191 + 100.64.27.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.46.7 + 100.64.46.7 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.28 + 100.64.8.28 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.8 + 100.64.46.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.9 + 100.64.46.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.47 + 100.64.12.47 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.10 + 100.64.46.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.11 + 100.64.46.11 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + INCIDENT_LINK + 1685416363 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d822a7a0-fe97-11ed-a08d-35e4f0a9a870 + + + diff --git a/graph/incidents_graphml/d/d8231470-6ef3-11ee-ab20-4f1e630cbb02.graphml b/graph/incidents_graphml/d/d8231470-6ef3-11ee-ab20-4f1e630cbb02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e28b0cb57a8cb5ad8eb7fda4c3e2bba24c70539f --- /dev/null +++ b/graph/incidents_graphml/d/d8231470-6ef3-11ee-ab20-4f1e630cbb02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.217 + 100.64.27.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697770407 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8231470-6ef3-11ee-ab20-4f1e630cbb02 + + + diff --git a/graph/incidents_graphml/d/d8269f60-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d8269f60-17ea-11ee-98ae-3df0911cfade.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7ee779580ca93f1f938602222554f888d3bf234 --- /dev/null +++ b/graph/incidents_graphml/d/d8269f60-17ea-11ee-98ae-3df0911cfade.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.194 + 100.64.74.194 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688200791 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8269f60-17ea-11ee-98ae-3df0911cfade + + + diff --git a/graph/incidents_graphml/d/d82ca830-2111-11ee-bca7-0d1d0c9aa4ab.graphml b/graph/incidents_graphml/d/d82ca830-2111-11ee-bca7-0d1d0c9aa4ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7673d3b3a31b5449815767036ba620fc3badea4 --- /dev/null +++ b/graph/incidents_graphml/d/d82ca830-2111-11ee-bca7-0d1d0c9aa4ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.146 + 100.64.48.146 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689207102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d82ca830-2111-11ee-bca7-0d1d0c9aa4ab + + + diff --git a/graph/incidents_graphml/d/d82de9e0-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d82de9e0-f058-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8484cb380a90f0c519e88c186a853892c11358ad --- /dev/null +++ b/graph/incidents_graphml/d/d82de9e0-f058-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711997487 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d82de9e0-f058-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/d/d82e96f0-29b7-11ee-b86f-6b6c9ebf54e6.graphml b/graph/incidents_graphml/d/d82e96f0-29b7-11ee-b86f-6b6c9ebf54e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c439c741ab5f625e87d2843952f3e6c7628df4b4 --- /dev/null +++ b/graph/incidents_graphml/d/d82e96f0-29b7-11ee-b86f-6b6c9ebf54e6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.171 + 100.64.19.171 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690158007 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d82e96f0-29b7-11ee-b86f-6b6c9ebf54e6 + + + diff --git a/graph/incidents_graphml/d/d8317630-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/d/d8317630-0bf4-11ee-9b02-ffb3de173f5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..954c2bb2a79d3f800e6b5b18352f2cf03e3c67c8 --- /dev/null +++ b/graph/incidents_graphml/d/d8317630-0bf4-11ee-9b02-ffb3de173f5d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.203 + 100.64.80.203 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.76.254 + 100.64.76.254 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686885672 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8317630-0bf4-11ee-9b02-ffb3de173f5d + + + INCIDENT_LINK + 1686885672 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8317630-0bf4-11ee-9b02-ffb3de173f5d + + + diff --git a/graph/incidents_graphml/d/d8320890-6ef3-11ee-ab20-4f1e630cbb02.graphml b/graph/incidents_graphml/d/d8320890-6ef3-11ee-ab20-4f1e630cbb02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..459208c84569e841d4b176bfed556547f76ec1e6 --- /dev/null +++ b/graph/incidents_graphml/d/d8320890-6ef3-11ee-ab20-4f1e630cbb02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.217 + 100.64.27.217 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697770407 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d8320890-6ef3-11ee-ab20-4f1e630cbb02 + + + diff --git a/graph/incidents_graphml/d/d8401ad0-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d8401ad0-17ea-11ee-98ae-3df0911cfade.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ebc96de71d94ec6be335b7cd2283f02a7092a20 --- /dev/null +++ b/graph/incidents_graphml/d/d8401ad0-17ea-11ee-98ae-3df0911cfade.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.194 + 100.64.74.194 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688200791 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d8401ad0-17ea-11ee-98ae-3df0911cfade + + + diff --git a/graph/incidents_graphml/d/d8476f30-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/d/d8476f30-0bf4-11ee-9b02-ffb3de173f5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e125c6faa9dcad865ccab1950e8f21bd78171c4 --- /dev/null +++ b/graph/incidents_graphml/d/d8476f30-0bf4-11ee-9b02-ffb3de173f5d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.203 + 100.64.7.203 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.70.253 + 100.64.70.253 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686885672 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8476f30-0bf4-11ee-9b02-ffb3de173f5d + + + INCIDENT_LINK + 1686885672 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8476f30-0bf4-11ee-9b02-ffb3de173f5d + + + diff --git a/graph/incidents_graphml/d/d84e2490-17ea-11ee-98ae-3df0911cfade.graphml b/graph/incidents_graphml/d/d84e2490-17ea-11ee-98ae-3df0911cfade.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a595d8a8b5227efbd7d4b14eabe0c3d0ab9ef0f --- /dev/null +++ b/graph/incidents_graphml/d/d84e2490-17ea-11ee-98ae-3df0911cfade.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.153 + 100.64.79.153 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688200791 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d84e2490-17ea-11ee-98ae-3df0911cfade + + + diff --git a/graph/incidents_graphml/d/d8628870-efe8-11ec-a293-5b334d10f0f6.graphml b/graph/incidents_graphml/d/d8628870-efe8-11ec-a293-5b334d10f0f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8daaef518001b368015d2e97358a4b0a7113cf15 --- /dev/null +++ b/graph/incidents_graphml/d/d8628870-efe8-11ec-a293-5b334d10f0f6.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.187 + 100.64.81.187 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.170 + USER-0015-1679.example.internal + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.188 + 100.64.81.188 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.189 + 100.64.81.189 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655654388 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8628870-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654388 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8628870-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654388 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8628870-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654388 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8628870-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654388 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8628870-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654388 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8628870-efe8-11ec-a293-5b334d10f0f6 + + + diff --git a/graph/incidents_graphml/d/d865c7c0-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/d/d865c7c0-ab6c-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e077bc0a33d38615ff5fcc7a101a6e9f2fd40a1 --- /dev/null +++ b/graph/incidents_graphml/d/d865c7c0-ab6c-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.94 + 100.64.88.94 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1676271949 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d865c7c0-ab6c-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/d/d865e9d0-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d865e9d0-f058-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1f9ab065b5ebf77ff2529ba5db18652561f1b87 --- /dev/null +++ b/graph/incidents_graphml/d/d865e9d0-f058-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.190 + 100.64.27.190 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711997487 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d865e9d0-f058-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/d/d86ad0d0-ab6c-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/d/d86ad0d0-ab6c-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83ec9510c7faf6ac1db5b71f5d47e83633395089 --- /dev/null +++ b/graph/incidents_graphml/d/d86ad0d0-ab6c-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.94 + 100.64.88.94 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676271949 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d86ad0d0-ab6c-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/d/d874ddf0-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d874ddf0-f058-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0452b932e6175594885b96fd234a42b89957aa9 --- /dev/null +++ b/graph/incidents_graphml/d/d874ddf0-f058-11ee-abdc-892822517928.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.59 + 100.64.13.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711997487 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d874ddf0-f058-11ee-abdc-892822517928 + + + INCIDENT_LINK + 1711997487 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d874ddf0-f058-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/d/d87af270-efe8-11ec-a293-5b334d10f0f6.graphml b/graph/incidents_graphml/d/d87af270-efe8-11ec-a293-5b334d10f0f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7d1a3d1c7999ae3d07f12ecd9966467d4fffaf2 --- /dev/null +++ b/graph/incidents_graphml/d/d87af270-efe8-11ec-a293-5b334d10f0f6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.193 + 100.64.81.193 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.36 + 100.64.73.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655654388 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d87af270-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654388 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d87af270-efe8-11ec-a293-5b334d10f0f6 + + + diff --git a/graph/incidents_graphml/d/d87c5b80-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/d/d87c5b80-0010-11ef-83c1-e54678fd0000.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a208f3f274164bb8091764b8af6a588cc397d64 --- /dev/null +++ b/graph/incidents_graphml/d/d87c5b80-0010-11ef-83c1-e54678fd0000.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.170 + 100.64.69.170 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"] + + + INCIDENT_LINK + 1713725782 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d87c5b80-0010-11ef-83c1-e54678fd0000 + + + diff --git a/graph/incidents_graphml/d/d87e5da0-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/d87e5da0-0cb8-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a1e76dad4bf69c06d51022aefa29c63a8079fd8 --- /dev/null +++ b/graph/incidents_graphml/d/d87e5da0-0cb8-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.149 + USER-0015-1476.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686969854 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d87e5da0-0cb8-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/d/d87f68c0-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/d/d87f68c0-0010-11ef-83c1-e54678fd0000.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98ca557792e218685aeb0e5abfffc3045410d579 --- /dev/null +++ b/graph/incidents_graphml/d/d87f68c0-0010-11ef-83c1-e54678fd0000.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"] + + + HOST + 100.64.69.170 + 100.64.69.170 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713725782 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d87f68c0-0010-11ef-83c1-e54678fd0000 + + + diff --git a/graph/incidents_graphml/d/d880ef60-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/d/d880ef60-0010-11ef-83c1-e54678fd0000.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f036c7a0251478b4b784a39558ffb85e5d7e154e --- /dev/null +++ b/graph/incidents_graphml/d/d880ef60-0010-11ef-83c1-e54678fd0000.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.136 + 100.64.12.136 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1713725782 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d880ef60-0010-11ef-83c1-e54678fd0000 + + + diff --git a/graph/incidents_graphml/d/d8831240-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/d/d8831240-0010-11ef-83c1-e54678fd0000.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88d31a66644990e84aac7ad3cb3128b919c2cd4c --- /dev/null +++ b/graph/incidents_graphml/d/d8831240-0010-11ef-83c1-e54678fd0000.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.12.136 + 100.64.12.136 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713725782 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d8831240-0010-11ef-83c1-e54678fd0000 + + + diff --git a/graph/incidents_graphml/d/d8850a90-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d8850a90-f058-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c47f9195e723630b05ba44cf5de9688d03e11778 --- /dev/null +++ b/graph/incidents_graphml/d/d8850a90-f058-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.59 + 100.64.13.59 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711997487 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8850a90-f058-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/d/d8855c80-1e11-11ee-9177-87bbc2825325.graphml b/graph/incidents_graphml/d/d8855c80-1e11-11ee-9177-87bbc2825325.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a572ac748f13e51dbc9661337e860da99d3c55b --- /dev/null +++ b/graph/incidents_graphml/d/d8855c80-1e11-11ee-9177-87bbc2825325.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.188 + 100.64.18.188 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.91 + 100.64.72.91 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.25.238 + 100.64.25.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.83.55 + 100.64.83.55 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.36.166 + 100.64.36.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.21.148 + 100.64.21.148 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688877249 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8855c80-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877249 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8855c80-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877249 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8855c80-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877249 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8855c80-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877249 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8855c80-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877249 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8855c80-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877249 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8855c80-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877249 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8855c80-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877249 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8855c80-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877249 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8855c80-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877249 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8855c80-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877249 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8855c80-1e11-11ee-9177-87bbc2825325 + + + diff --git a/graph/incidents_graphml/d/d8878a50-36c6-11ee-b2fc-7d6cdcd897bf.graphml b/graph/incidents_graphml/d/d8878a50-36c6-11ee-b2fc-7d6cdcd897bf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56273a6cf33bad761dfd87a747a52fff66476f58 --- /dev/null +++ b/graph/incidents_graphml/d/d8878a50-36c6-11ee-b2fc-7d6cdcd897bf.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.181 + 100.64.62.181 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.107 + 100.64.27.107 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.47 + 100.64.34.47 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.182 + 100.64.62.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.18 + 100.64.7.18 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.113 + 100.64.59.113 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.59 + 100.64.5.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.183 + 100.64.62.183 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.184 + 100.64.62.184 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.185 + 100.64.62.185 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.186 + 100.64.62.186 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.187 + 100.64.62.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.12 + 100.64.17.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.188 + 100.64.62.188 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.189 + 100.64.62.189 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.190 + 100.64.62.190 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.191 + USER-0015-1450.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.152 + 100.64.51.152 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.192 + 100.64.62.192 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593816 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8878a50-36c6-11ee-b2fc-7d6cdcd897bf + + + diff --git a/graph/incidents_graphml/d/d8929f20-f058-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/d/d8929f20-f058-11ee-abdc-892822517928.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52ad34d50c9a6a4fbe8d3b57dc1177bd1ee46e9d --- /dev/null +++ b/graph/incidents_graphml/d/d8929f20-f058-11ee-abdc-892822517928.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.227 + 100.64.35.227 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711997487 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8929f20-f058-11ee-abdc-892822517928 + + + diff --git a/graph/incidents_graphml/d/d8a45f50-285b-11ee-a03d-7b364f1dc27e.graphml b/graph/incidents_graphml/d/d8a45f50-285b-11ee-a03d-7b364f1dc27e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8a11bc84677a6c345addb85c208cb947e99f82c --- /dev/null +++ b/graph/incidents_graphml/d/d8a45f50-285b-11ee-a03d-7b364f1dc27e.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.219 + 100.64.32.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.220 + 100.64.32.220 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.221 + USER-0015-1293.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.206 + 100.64.6.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.222 + 100.64.32.222 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.223 + 100.64.32.223 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.71 + 100.64.10.71 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.224 + 100.64.32.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.225 + 100.64.32.225 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8a45f50-285b-11ee-a03d-7b364f1dc27e + + + diff --git a/graph/incidents_graphml/d/d8ae8e80-f0fb-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/d/d8ae8e80-f0fb-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..124817bf10d9142e20e30fbf4ba9adf3254b22c1 --- /dev/null +++ b/graph/incidents_graphml/d/d8ae8e80-f0fb-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.166 + 100.64.25.166 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712067495 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8ae8e80-f0fb-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/d/d8b81cf0-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d8b81cf0-2084-11ed-a2df-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b35315a6dffef070ae49f597b653da37e45d006 --- /dev/null +++ b/graph/incidents_graphml/d/d8b81cf0-2084-11ed-a2df-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.79 + 100.64.93.79 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660999046 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8b81cf0-2084-11ed-a2df-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/d/d8bb90d0-285b-11ee-a03d-7b364f1dc27e.graphml b/graph/incidents_graphml/d/d8bb90d0-285b-11ee-a03d-7b364f1dc27e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0bd51efc6da0b2c8a19adb0cb0028951400c2f49 --- /dev/null +++ b/graph/incidents_graphml/d/d8bb90d0-285b-11ee-a03d-7b364f1dc27e.graphml @@ -0,0 +1,481 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.233 + USER-0015-1294.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.234 + 100.64.32.234 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.235 + 100.64.32.235 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.236 + 100.64.32.236 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.14 + 100.64.5.14 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.237 + 100.64.32.237 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.238 + 100.64.32.238 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.239 + 100.64.32.239 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.240 + 100.64.32.240 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.233 + 100.64.31.233 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + INCIDENT_LINK + 1690008543 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8bb90d0-285b-11ee-a03d-7b364f1dc27e + + + diff --git a/graph/incidents_graphml/d/d8c2c690-7aca-11ee-8dd4-f72b2f730b80.graphml b/graph/incidents_graphml/d/d8c2c690-7aca-11ee-8dd4-f72b2f730b80.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27c0e6e999ca9e3d0be6a02236f572c21f1b3a88 --- /dev/null +++ b/graph/incidents_graphml/d/d8c2c690-7aca-11ee-8dd4-f72b2f730b80.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-0957.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1699072213 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d8c2c690-7aca-11ee-8dd4-f72b2f730b80 + + + diff --git a/graph/incidents_graphml/d/d8c69be0-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d8c69be0-2084-11ed-a2df-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e718b81e1fe6f48060bdb690a76614d05cbec30 --- /dev/null +++ b/graph/incidents_graphml/d/d8c69be0-2084-11ed-a2df-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.79 + 100.64.93.79 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660999046 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d8c69be0-2084-11ed-a2df-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/d/d8cd80f0-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/d/d8cd80f0-f135-11ec-9654-cb9d1f320859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..748d57ba1b25fce88e2798326203b22210670eb1 --- /dev/null +++ b/graph/incidents_graphml/d/d8cd80f0-f135-11ec-9654-cb9d1f320859.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.40 + 100.64.75.40 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8cd80f0-f135-11ec-9654-cb9d1f320859 + + + INCIDENT_LINK + 1655797411 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8cd80f0-f135-11ec-9654-cb9d1f320859 + + + diff --git a/graph/incidents_graphml/d/d8cdc4f0-097d-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/d/d8cdc4f0-097d-11ee-8b37-9ba18759a170.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6957e691259ed20c980ebf82b3d3ca78c6e1747 --- /dev/null +++ b/graph/incidents_graphml/d/d8cdc4f0-097d-11ee-8b37-9ba18759a170.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.87 + 100.64.68.87 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.23.158 + 100.64.23.158 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1686614660 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8cdc4f0-097d-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614660 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8cdc4f0-097d-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614660 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8cdc4f0-097d-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614660 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8cdc4f0-097d-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614660 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8cdc4f0-097d-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614660 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8cdc4f0-097d-11ee-8b37-9ba18759a170 + + + diff --git a/graph/incidents_graphml/d/d8ceb230-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d8ceb230-2084-11ed-a2df-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17adcc9483e64cfcac7367d0d90980494ac52030 --- /dev/null +++ b/graph/incidents_graphml/d/d8ceb230-2084-11ed-a2df-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.41 + 100.64.76.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660999046 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d8ceb230-2084-11ed-a2df-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/d/d8d73db0-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d8d73db0-2084-11ed-a2df-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4b0e37306e4813cf472a4026813c7ad12ec3820 --- /dev/null +++ b/graph/incidents_graphml/d/d8d73db0-2084-11ed-a2df-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.76.41 + 100.64.76.41 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660999046 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d8d73db0-2084-11ed-a2df-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/d/d8db0e40-2084-11ed-a2df-9fe2f28e2833.graphml b/graph/incidents_graphml/d/d8db0e40-2084-11ed-a2df-9fe2f28e2833.graphml new file mode 100644 index 0000000000000000000000000000000000000000..016dd3feeb99d13faf22809a35fb46ab708c530d --- /dev/null +++ b/graph/incidents_graphml/d/d8db0e40-2084-11ed-a2df-9fe2f28e2833.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.198 + 100.64.51.198 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660999046 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d8db0e40-2084-11ed-a2df-9fe2f28e2833 + + + diff --git a/graph/incidents_graphml/d/d8ebca50-15b5-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/d/d8ebca50-15b5-11ef-8b2e-b54e20f7e466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9271e7e8dbbcf016fd957e7d20144ed4171f930 --- /dev/null +++ b/graph/incidents_graphml/d/d8ebca50-15b5-11ef-8b2e-b54e20f7e466.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.93 + 100.64.95.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.95.94 + 100.64.95.94 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.18 + 100.64.5.18 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.95 + 100.64.95.95 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716105624 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8ebca50-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105624 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8ebca50-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105624 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8ebca50-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105624 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8ebca50-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105624 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8ebca50-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105624 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8ebca50-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105624 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8ebca50-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105624 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d8ebca50-15b5-11ef-8b2e-b54e20f7e466 + + + diff --git a/graph/incidents_graphml/d/d8f35f40-5c88-11ee-8e0e-93298c809ccb.graphml b/graph/incidents_graphml/d/d8f35f40-5c88-11ee-8e0e-93298c809ccb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29e9c2b444c64ac53cd97b4d224391b56bdd6341 --- /dev/null +++ b/graph/incidents_graphml/d/d8f35f40-5c88-11ee-8e0e-93298c809ccb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1695745332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d8f35f40-5c88-11ee-8e0e-93298c809ccb + + + INCIDENT_LINK + 1695745332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d8f35f40-5c88-11ee-8e0e-93298c809ccb + + + diff --git a/graph/incidents_graphml/d/d9020c90-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/d9020c90-0cb8-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dfa26e1f387461a3f1728012700a07bf93316635 --- /dev/null +++ b/graph/incidents_graphml/d/d9020c90-0cb8-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.151 + 100.64.66.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686969855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9020c90-0cb8-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686969855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9020c90-0cb8-11ee-9777-83d870147fdf + + + INCIDENT_LINK + 1686969855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9020c90-0cb8-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/d/d910fa10-435e-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/d/d910fa10-435e-11ef-9e66-fd84d5bf3736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f88ccd577a3b1823e4fda9ac0da1c3495a432817 --- /dev/null +++ b/graph/incidents_graphml/d/d910fa10-435e-11ef-9e66-fd84d5bf3736.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.105 + 100.64.20.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721126012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d910fa10-435e-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d910fa10-435e-11ef-9e66-fd84d5bf3736 + + + diff --git a/graph/incidents_graphml/d/d916cb10-2efc-11ee-bea9-c5ecb1b621be.graphml b/graph/incidents_graphml/d/d916cb10-2efc-11ee-bea9-c5ecb1b621be.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc96f3a37f884568aec362e790ab522a1a362540 --- /dev/null +++ b/graph/incidents_graphml/d/d916cb10-2efc-11ee-bea9-c5ecb1b621be.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.233 + 100.64.81.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.249 + 100.64.73.249 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690737400 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d916cb10-2efc-11ee-bea9-c5ecb1b621be + + + diff --git a/graph/incidents_graphml/d/d91c8d80-3170-11ef-ac7f-916edbe5b1d5.graphml b/graph/incidents_graphml/d/d91c8d80-3170-11ef-ac7f-916edbe5b1d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..751abccfa4857d1d5e2c9e112496d8f896b1f8e1 --- /dev/null +++ b/graph/incidents_graphml/d/d91c8d80-3170-11ef-ac7f-916edbe5b1d5.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.197 + 100.64.43.197 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.26 + 100.64.60.26 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.183 + 100.64.15.183 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.27 + 100.64.60.27 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.28 + 100.64.60.28 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.29 + 100.64.60.29 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.13 + 100.64.11.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.4 + 100.64.60.4 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.203 + 100.64.37.203 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.30 + 100.64.60.30 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.77 + 100.64.49.77 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.31 + 100.64.60.31 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.223 + USER-0015-1438.example.internal + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.32 + 100.64.60.32 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.33 + 100.64.60.33 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + INCIDENT_LINK + 1719154622 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d91c8d80-3170-11ef-ac7f-916edbe5b1d5 + + + diff --git a/graph/incidents_graphml/d/d9321b40-2efc-11ee-bea9-c5ecb1b621be.graphml b/graph/incidents_graphml/d/d9321b40-2efc-11ee-bea9-c5ecb1b621be.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44b739f4243fe23cc44219c3dca169d69cf83db2 --- /dev/null +++ b/graph/incidents_graphml/d/d9321b40-2efc-11ee-bea9-c5ecb1b621be.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.249 + 100.64.73.249 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.233 + 100.64.81.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690737400 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9321b40-2efc-11ee-bea9-c5ecb1b621be + + + diff --git a/graph/incidents_graphml/d/d9335c10-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/d/d9335c10-bcf3-11ed-9421-6db30872eff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa8edd9f91eef7a6d3d22922847fd7c662aa3728 --- /dev/null +++ b/graph/incidents_graphml/d/d9335c10-bcf3-11ed-9421-6db30872eff3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.47 + 100.64.82.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678199102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9335c10-bcf3-11ed-9421-6db30872eff3 + + + diff --git a/graph/incidents_graphml/d/d9381700-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/d/d9381700-bcf3-11ed-9421-6db30872eff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1017339ba1b034138f33a920c8f153d6630e5a70 --- /dev/null +++ b/graph/incidents_graphml/d/d9381700-bcf3-11ed-9421-6db30872eff3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.82.47 + 100.64.82.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678199102 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9381700-bcf3-11ed-9421-6db30872eff3 + + + diff --git a/graph/incidents_graphml/d/d93c5670-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/d93c5670-0cb8-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..035d248d9bce0a91ba7733c0e8d5d6ec7dd3406d --- /dev/null +++ b/graph/incidents_graphml/d/d93c5670-0cb8-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.151 + 100.64.66.151 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686969855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + d93c5670-0cb8-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/d/d93dbc50-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/d/d93dbc50-bcf3-11ed-9421-6db30872eff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92e00bad65c7971f2fec8f1bd07004e187b27664 --- /dev/null +++ b/graph/incidents_graphml/d/d93dbc50-bcf3-11ed-9421-6db30872eff3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.47 + 100.64.86.47 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1678199102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d93dbc50-bcf3-11ed-9421-6db30872eff3 + + + diff --git a/graph/incidents_graphml/d/d94165d0-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/d/d94165d0-bcf3-11ed-9421-6db30872eff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2eec2ff7bd7fb05bb982bd218ee51b5aad8c252f --- /dev/null +++ b/graph/incidents_graphml/d/d94165d0-bcf3-11ed-9421-6db30872eff3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.86.47 + 100.64.86.47 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678199102 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d94165d0-bcf3-11ed-9421-6db30872eff3 + + + diff --git a/graph/incidents_graphml/d/d941f820-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/d941f820-1b7b-11ed-8ae2-15a147a6b00c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77ad9d87e0c69e61c1bb58f589c0df6b157a8cdd --- /dev/null +++ b/graph/incidents_graphml/d/d941f820-1b7b-11ed-8ae2-15a147a6b00c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.139 + 100.64.80.139 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.70.234 + 100.64.70.234 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660445425 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d941f820-1b7b-11ed-8ae2-15a147a6b00c + + + diff --git a/graph/incidents_graphml/d/d9445ae0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d9445ae0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a3e4922f4e8f21a891063afc079b90416afd31f --- /dev/null +++ b/graph/incidents_graphml/d/d9445ae0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.248 + 100.64.19.248 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712924772 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d9445ae0-f8c7-11ee-baa1-bf8b9aebe6d6 + + + diff --git a/graph/incidents_graphml/d/d9518880-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/d9518880-1b7b-11ed-8ae2-15a147a6b00c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..021a3f727e6e3666946d1360e928e7f342f10042 --- /dev/null +++ b/graph/incidents_graphml/d/d9518880-1b7b-11ed-8ae2-15a147a6b00c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.234 + 100.64.70.234 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.139 + 100.64.80.139 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660445425 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9518880-1b7b-11ed-8ae2-15a147a6b00c + + + diff --git a/graph/incidents_graphml/d/d955afd0-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/d955afd0-6e29-11ee-b3d5-39e2e796f8b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e410b01b8a489d4382b807a3f375ef89622c2bd --- /dev/null +++ b/graph/incidents_graphml/d/d955afd0-6e29-11ee-b3d5-39e2e796f8b3.graphml @@ -0,0 +1,481 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.194 + 100.64.51.194 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.248 + 100.64.8.248 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.159 + 100.64.14.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.196 + 100.64.51.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.197 + 100.64.51.197 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.125 + 100.64.44.125 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.47 + 100.64.46.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.115 + 100.64.33.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.198 + 100.64.51.198 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.104 + 100.64.41.104 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + INCIDENT_LINK + 1697683651 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d955afd0-6e29-11ee-b3d5-39e2e796f8b3 + + + diff --git a/graph/incidents_graphml/d/d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7.graphml b/graph/incidents_graphml/d/d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..339d30ade01c5610b36f58bf13fa849b6a354c6a --- /dev/null +++ b/graph/incidents_graphml/d/d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.86 + 100.64.71.86 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.87 + 100.64.71.87 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.88 + 100.64.71.88 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.250 + 100.64.70.250 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.89 + 100.64.71.89 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.90 + 100.64.71.90 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662521183 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521183 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521183 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521183 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521183 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521183 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521183 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7 + + + INCIDENT_LINK + 1662521183 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9568b70-2e5c-11ed-9b4d-8fddd3d92ef7 + + + diff --git a/graph/incidents_graphml/d/d95746a0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d95746a0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc2676854d1390a44143282debc2b7b1cd447692 --- /dev/null +++ b/graph/incidents_graphml/d/d95746a0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.248 + 100.64.19.248 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1712924772 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d95746a0-f8c7-11ee-baa1-bf8b9aebe6d6 + + + diff --git a/graph/incidents_graphml/d/d9586690-11ca-11ef-a994-fb0e1dc0413b.graphml b/graph/incidents_graphml/d/d9586690-11ca-11ef-a994-fb0e1dc0413b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea7d13b44587062f8db355cd129b326240286aae --- /dev/null +++ b/graph/incidents_graphml/d/d9586690-11ca-11ef-a994-fb0e1dc0413b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.110 + 100.64.8.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715674840 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9586690-11ca-11ef-a994-fb0e1dc0413b + + + diff --git a/graph/incidents_graphml/d/d9690c20-2031-11ed-9c49-d577d9b7e617.graphml b/graph/incidents_graphml/d/d9690c20-2031-11ed-9c49-d577d9b7e617.graphml new file mode 100644 index 0000000000000000000000000000000000000000..003caabc277ff22cf63da3d3656c103145490d13 --- /dev/null +++ b/graph/incidents_graphml/d/d9690c20-2031-11ed-9c49-d577d9b7e617.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.197 + 100.64.79.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.139 + 100.64.71.139 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660963399 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d9690c20-2031-11ed-9c49-d577d9b7e617 + + + diff --git a/graph/incidents_graphml/d/d96c2e30-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d96c2e30-f8c7-11ee-baa1-bf8b9aebe6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7ee683f484e292621a012832941751acde3dd03 --- /dev/null +++ b/graph/incidents_graphml/d/d96c2e30-f8c7-11ee-baa1-bf8b9aebe6d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.236 + 100.64.40.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712924772 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d96c2e30-f8c7-11ee-baa1-bf8b9aebe6d6 + + + diff --git a/graph/incidents_graphml/d/d96c9e90-f6b2-11ee-b30f-810e76324c4a.graphml b/graph/incidents_graphml/d/d96c9e90-f6b2-11ee-b30f-810e76324c4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c7cd79b265fb3e502a9d1b091e2470b35387adb --- /dev/null +++ b/graph/incidents_graphml/d/d96c9e90-f6b2-11ee-b30f-810e76324c4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.155 + 100.64.52.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712695850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d96c9e90-f6b2-11ee-b30f-810e76324c4a + + + diff --git a/graph/incidents_graphml/d/d9765290-2031-11ed-9c49-d577d9b7e617.graphml b/graph/incidents_graphml/d/d9765290-2031-11ed-9c49-d577d9b7e617.graphml new file mode 100644 index 0000000000000000000000000000000000000000..419520abea5b4c52749082abdbf33fd9bc7829ef --- /dev/null +++ b/graph/incidents_graphml/d/d9765290-2031-11ed-9c49-d577d9b7e617.graphml @@ -0,0 +1,215 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.246 + 100.64.70.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.151 + 100.64.71.151 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.198 + 100.64.79.198 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.119 + 100.64.71.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.199 + 100.64.79.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.53 + 100.64.1.53 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.200 + 100.64.79.200 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660963399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9765290-2031-11ed-9c49-d577d9b7e617 + + + INCIDENT_LINK + 1660963399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9765290-2031-11ed-9c49-d577d9b7e617 + + + INCIDENT_LINK + 1660963399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9765290-2031-11ed-9c49-d577d9b7e617 + + + INCIDENT_LINK + 1660963399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9765290-2031-11ed-9c49-d577d9b7e617 + + + INCIDENT_LINK + 1660963399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9765290-2031-11ed-9c49-d577d9b7e617 + + + INCIDENT_LINK + 1660963399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9765290-2031-11ed-9c49-d577d9b7e617 + + + INCIDENT_LINK + 1660963399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9765290-2031-11ed-9c49-d577d9b7e617 + + + INCIDENT_LINK + 1660963399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9765290-2031-11ed-9c49-d577d9b7e617 + + + INCIDENT_LINK + 1660963399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9765290-2031-11ed-9c49-d577d9b7e617 + + + diff --git a/graph/incidents_graphml/d/d9844a10-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d9844a10-f8c7-11ee-baa1-bf8b9aebe6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..058c4c935ea39db0bea8014a9d4598e0adf24bb6 --- /dev/null +++ b/graph/incidents_graphml/d/d9844a10-f8c7-11ee-baa1-bf8b9aebe6d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.236 + 100.64.40.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712924772 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9844a10-f8c7-11ee-baa1-bf8b9aebe6d6 + + + diff --git a/graph/incidents_graphml/d/d998e380-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d998e380-f8c7-11ee-baa1-bf8b9aebe6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..999dfe888b8ac755688661f813f542fc03053610 --- /dev/null +++ b/graph/incidents_graphml/d/d998e380-f8c7-11ee-baa1-bf8b9aebe6d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.112 + 100.64.8.112 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712924772 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d998e380-f8c7-11ee-baa1-bf8b9aebe6d6 + + + diff --git a/graph/incidents_graphml/d/d9ac6140-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/d9ac6140-9562-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42787e724f0032747588f588ddd48b5c3d3694be --- /dev/null +++ b/graph/incidents_graphml/d/d9ac6140-9562-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.116 + 100.64.71.116 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.129 + 100.64.72.129 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.235 + 100.64.71.235 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.78.164 + 100.64.78.164 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.69.182 + 100.64.69.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.165 + 100.64.78.165 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1673848730 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9ac6140-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848730 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9ac6140-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848730 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9ac6140-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848730 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9ac6140-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848730 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9ac6140-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848730 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9ac6140-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848730 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9ac6140-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848730 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9ac6140-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848730 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9ac6140-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848730 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9ac6140-9562-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/d/d9c2d9b0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d9c2d9b0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f7167a606b80d27e053c35095e112e9cc9c5582 --- /dev/null +++ b/graph/incidents_graphml/d/d9c2d9b0-f8c7-11ee-baa1-bf8b9aebe6d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.142 + 100.64.15.142 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712924773 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d9c2d9b0-f8c7-11ee-baa1-bf8b9aebe6d6 + + + diff --git a/graph/incidents_graphml/d/d9d51400-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/d9d51400-0cb8-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..efd31ca1e8e14924032939ac26c7473427e41d91 --- /dev/null +++ b/graph/incidents_graphml/d/d9d51400-0cb8-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.128 + 100.64.3.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686969856 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + d9d51400-0cb8-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/d/d9eaad00-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/d9eaad00-f8c7-11ee-baa1-bf8b9aebe6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa20b7a63e31c31288b2a2fe5106104b25814ec6 --- /dev/null +++ b/graph/incidents_graphml/d/d9eaad00-f8c7-11ee-baa1-bf8b9aebe6d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.238 + 100.64.40.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712924773 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9eaad00-f8c7-11ee-baa1-bf8b9aebe6d6 + + + diff --git a/graph/incidents_graphml/d/d9f175a0-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/d9f175a0-0cb8-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..01d553d7d3cc8fa6a05d95e8817ac4e7774b5979 --- /dev/null +++ b/graph/incidents_graphml/d/d9f175a0-0cb8-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.128 + 100.64.3.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686969856 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + d9f175a0-0cb8-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/d/d9f98360-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/d/d9f98360-13f4-11ee-9bb8-6b8312f57fd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ada942fd126cf9cca7fc1f37c2b226b9cbed3cfb --- /dev/null +++ b/graph/incidents_graphml/d/d9f98360-13f4-11ee-9bb8-6b8312f57fd1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.63 + USER-0015-1644.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687765284 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d9f98360-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765284 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + d9f98360-13f4-11ee-9bb8-6b8312f57fd1 + + + diff --git a/graph/incidents_graphml/d/da0c8a20-fcd2-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/d/da0c8a20-fcd2-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06b4d718958b7630637b59f3bc015dd28f4dd50d --- /dev/null +++ b/graph/incidents_graphml/d/da0c8a20-fcd2-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.145 + 100.64.8.145 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685221805 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + da0c8a20-fcd2-11ed-af18-a9f44b259145 + + + INCIDENT_LINK + 1685221805 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + da0c8a20-fcd2-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/d/da237040-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/da237040-f8c7-11ee-baa1-bf8b9aebe6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3b360e5321c6e2e9a098c570cb7612ae3f208fa --- /dev/null +++ b/graph/incidents_graphml/d/da237040-f8c7-11ee-baa1-bf8b9aebe6d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.143 + 100.64.24.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712924773 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + da237040-f8c7-11ee-baa1-bf8b9aebe6d6 + + + diff --git a/graph/incidents_graphml/d/da2a21a0-5792-11ee-97ff-3b19ab007f30.graphml b/graph/incidents_graphml/d/da2a21a0-5792-11ee-97ff-3b19ab007f30.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93b5d0a9f2a7606756c63964498fa2de39d93c0f --- /dev/null +++ b/graph/incidents_graphml/d/da2a21a0-5792-11ee-97ff-3b19ab007f30.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.10 + 100.64.37.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.26.235 + 100.64.26.235 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695199873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + da2a21a0-5792-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695199873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + da2a21a0-5792-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695199873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + da2a21a0-5792-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695199873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + da2a21a0-5792-11ee-97ff-3b19ab007f30 + + + diff --git a/graph/incidents_graphml/d/da3daf00-f8c7-11ee-baa1-bf8b9aebe6d6.graphml b/graph/incidents_graphml/d/da3daf00-f8c7-11ee-baa1-bf8b9aebe6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2390ba8906780df176aa842e8e2a47fa7e6288c0 --- /dev/null +++ b/graph/incidents_graphml/d/da3daf00-f8c7-11ee-baa1-bf8b9aebe6d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.143 + 100.64.24.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712924773 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + da3daf00-f8c7-11ee-baa1-bf8b9aebe6d6 + + + diff --git a/graph/incidents_graphml/d/da429ce0-1e11-11ee-9177-87bbc2825325.graphml b/graph/incidents_graphml/d/da429ce0-1e11-11ee-9177-87bbc2825325.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac169662113f23447a4dba9e291a58f64b9f5cca --- /dev/null +++ b/graph/incidents_graphml/d/da429ce0-1e11-11ee-9177-87bbc2825325.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.68 + 100.64.30.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.51 + 100.64.72.51 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.63.52 + 100.64.63.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.57.211 + 100.64.57.211 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688877252 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + da429ce0-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877252 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + da429ce0-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877252 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + da429ce0-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877252 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + da429ce0-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877252 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + da429ce0-1e11-11ee-9177-87bbc2825325 + + + INCIDENT_LINK + 1688877252 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + da429ce0-1e11-11ee-9177-87bbc2825325 + + + diff --git a/graph/incidents_graphml/d/da47c880-076a-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/d/da47c880-076a-11ef-93a8-d78cfa287885.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b02565e3772f16b90e7fa2ab4c7fff98b73911f3 --- /dev/null +++ b/graph/incidents_graphml/d/da47c880-076a-11ef-93a8-d78cfa287885.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.94.7 + 100.64.94.7 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714534098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + da47c880-076a-11ef-93a8-d78cfa287885 + + + diff --git a/graph/incidents_graphml/d/da668e60-5792-11ee-97ff-3b19ab007f30.graphml b/graph/incidents_graphml/d/da668e60-5792-11ee-97ff-3b19ab007f30.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e6ea6734e32d33f10b9b77975d27b421ad7b662 --- /dev/null +++ b/graph/incidents_graphml/d/da668e60-5792-11ee-97ff-3b19ab007f30.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"] + + + INCIDENT_LINK + 1695199873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + da668e60-5792-11ee-97ff-3b19ab007f30 + + + INCIDENT_LINK + 1695199873 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + da668e60-5792-11ee-97ff-3b19ab007f30 + + + diff --git a/graph/incidents_graphml/d/da86d550-0983-11ef-a068-8dbaaaaf6c28.graphml b/graph/incidents_graphml/d/da86d550-0983-11ef-a068-8dbaaaaf6c28.graphml new file mode 100644 index 0000000000000000000000000000000000000000..720ec02ddf692f02a347e0b7338ac0b8bb08114e --- /dev/null +++ b/graph/incidents_graphml/d/da86d550-0983-11ef-a068-8dbaaaaf6c28.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.121 + 100.64.62.121 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714764738 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + da86d550-0983-11ef-a068-8dbaaaaf6c28 + + + diff --git a/graph/incidents_graphml/d/da888580-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/da888580-0cb8-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42dc6ebf483acae7229441aa52374fda0c8996f3 --- /dev/null +++ b/graph/incidents_graphml/d/da888580-0cb8-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.236 + 100.64.17.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686969857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + da888580-0cb8-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/d/daa05110-9508-11ed-bd9f-81e534a2ee12.graphml b/graph/incidents_graphml/d/daa05110-9508-11ed-bd9f-81e534a2ee12.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2497f2c07de3b384d95ade302b447d86e0415ae5 --- /dev/null +++ b/graph/incidents_graphml/d/daa05110-9508-11ed-bd9f-81e534a2ee12.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.77 + 100.64.84.77 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.0.145.98 + USER-0015-0957.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1673810077 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + daa05110-9508-11ed-bd9f-81e534a2ee12 + + + diff --git a/graph/incidents_graphml/d/daa853d0-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/d/daa853d0-92f9-11ed-844e-b1b9f26efb97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d40acdacdba2885f6c4ffb5408b1df5e0679d0fa --- /dev/null +++ b/graph/incidents_graphml/d/daa853d0-92f9-11ed-844e-b1b9f26efb97.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.104 + 100.64.85.104 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-1968.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1673583733 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + daa853d0-92f9-11ed-844e-b1b9f26efb97 + + + diff --git a/graph/incidents_graphml/d/daa953f0-0cb8-11ee-9777-83d870147fdf.graphml b/graph/incidents_graphml/d/daa953f0-0cb8-11ee-9777-83d870147fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72abdcf987cf219f1e06c1a73c6836346de94bef --- /dev/null +++ b/graph/incidents_graphml/d/daa953f0-0cb8-11ee-9777-83d870147fdf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.236 + 100.64.17.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686969857 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + daa953f0-0cb8-11ee-9777-83d870147fdf + + + diff --git a/graph/incidents_graphml/d/daafcde0-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/d/daafcde0-92f9-11ed-844e-b1b9f26efb97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c596feb0338b399efdf9315c31b0dfb5e80dbe8 --- /dev/null +++ b/graph/incidents_graphml/d/daafcde0-92f9-11ed-844e-b1b9f26efb97.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1968.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.104 + 100.64.85.104 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1673583733 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + daafcde0-92f9-11ed-844e-b1b9f26efb97 + + + diff --git a/graph/incidents_graphml/d/dab51e00-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/dab51e00-d3dd-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e92f24d0a37146e892ca26e3f4e7416457b84489 --- /dev/null +++ b/graph/incidents_graphml/d/dab51e00-d3dd-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.179 + 100.64.4.179 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708866030 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dab51e00-d3dd-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/d/dacb1310-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/d/dacb1310-bcf3-11ed-9421-6db30872eff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbe9b24177afc93d547c955cdf350d359b92f583 --- /dev/null +++ b/graph/incidents_graphml/d/dacb1310-bcf3-11ed-9421-6db30872eff3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.44 + 100.64.86.44 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1678199105 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dacb1310-bcf3-11ed-9421-6db30872eff3 + + + diff --git a/graph/incidents_graphml/d/dad1bfe0-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/dad1bfe0-1b7b-11ed-8ae2-15a147a6b00c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..584c8eda9b762f92fd532d429b7b8c727b0c9e4c --- /dev/null +++ b/graph/incidents_graphml/d/dad1bfe0-1b7b-11ed-8ae2-15a147a6b00c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.27 + 100.64.79.27 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.181 + 100.64.75.181 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660445428 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dad1bfe0-1b7b-11ed-8ae2-15a147a6b00c + + + diff --git a/graph/incidents_graphml/d/dad8dc80-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dad8dc80-5392-11ee-8b4b-a5c1684d0e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1003ee56074f0a152ae3d2595623e577880ce4b --- /dev/null +++ b/graph/incidents_graphml/d/dad8dc80-5392-11ee-8b4b-a5c1684d0e53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.61 + 100.64.49.61 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694760069 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dad8dc80-5392-11ee-8b4b-a5c1684d0e53 + + + diff --git a/graph/incidents_graphml/d/dad8fbc0-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/dad8fbc0-3452-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d145871e77bf5753b467e938a01577d4f75a7bf5 --- /dev/null +++ b/graph/incidents_graphml/d/dad8fbc0-3452-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.48 + 100.64.21.48 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691324096 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dad8fbc0-3452-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/dad947d0-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/dad947d0-d3dd-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7addf69c6a58085c665306c50fed2ade3250407 --- /dev/null +++ b/graph/incidents_graphml/d/dad947d0-d3dd-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708866030 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dad947d0-d3dd-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/d/dadf83e0-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/d/dadf83e0-3b83-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19ec2e748001afba1fc4b573b18eff4f7388a522 --- /dev/null +++ b/graph/incidents_graphml/d/dadf83e0-3b83-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.101 + 100.64.62.101 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692114799 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dadf83e0-3b83-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/d/dae25720-2cea-11ee-b828-99998b56933c.graphml b/graph/incidents_graphml/d/dae25720-2cea-11ee-b828-99998b56933c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..473c1e826eb016f1bfac97f8c0fd212b5a925069 --- /dev/null +++ b/graph/incidents_graphml/d/dae25720-2cea-11ee-b828-99998b56933c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.235 + 100.64.71.235 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690509770 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dae25720-2cea-11ee-b828-99998b56933c + + + INCIDENT_LINK + 1690509770 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dae25720-2cea-11ee-b828-99998b56933c + + + diff --git a/graph/incidents_graphml/d/dae93030-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dae93030-5392-11ee-8b4b-a5c1684d0e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85cbc0c75f884125400f0321a74a672d82d0dee7 --- /dev/null +++ b/graph/incidents_graphml/d/dae93030-5392-11ee-8b4b-a5c1684d0e53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.61 + 100.64.49.61 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694760069 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dae93030-5392-11ee-8b4b-a5c1684d0e53 + + + diff --git a/graph/incidents_graphml/d/daeb2220-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/daeb2220-d3dd-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00d9bd4a6eab3b27a7c2a04dd41e2a2ae5c6177b --- /dev/null +++ b/graph/incidents_graphml/d/daeb2220-d3dd-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708866031 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + daeb2220-d3dd-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/d/daef09d0-15b4-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/d/daef09d0-15b4-11ef-8b2e-b54e20f7e466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ffaa00e2580c98b4c6fb999eb0c75a948a70420 --- /dev/null +++ b/graph/incidents_graphml/d/daef09d0-15b4-11ef-8b2e-b54e20f7e466.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.206 + 100.64.6.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 100.64.95.59 + 100.64.95.59 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.60 + 100.64.95.60 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch","Barracuda WAF"] + + + HOST + 100.64.46.24 + 100.64.46.24 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716105198 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + daef09d0-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105198 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + daef09d0-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105198 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + daef09d0-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105198 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + daef09d0-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105198 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + daef09d0-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105198 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + daef09d0-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105198 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + daef09d0-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105198 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + daef09d0-15b4-11ef-8b2e-b54e20f7e466 + + + diff --git a/graph/incidents_graphml/d/dafe8520-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/dafe8520-3452-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4511e7f866227c92ad8303e59e97019f16555248 --- /dev/null +++ b/graph/incidents_graphml/d/dafe8520-3452-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.48 + 100.64.21.48 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691324096 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dafe8520-3452-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/db042fe0-0597-11ef-8baf-8702a266b8b0.graphml b/graph/incidents_graphml/d/db042fe0-0597-11ef-8baf-8702a266b8b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bfcc5114a0c6862a90e4a30f036a4f7d5da34bf0 --- /dev/null +++ b/graph/incidents_graphml/d/db042fe0-0597-11ef-8baf-8702a266b8b0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.92.42 + 100.64.92.42 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1714333524 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db042fe0-0597-11ef-8baf-8702a266b8b0 + + + diff --git a/graph/incidents_graphml/d/db062040-bcf3-11ed-9421-6db30872eff3.graphml b/graph/incidents_graphml/d/db062040-bcf3-11ed-9421-6db30872eff3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..afcef14443efce9352265352b112ee41e94cee72 --- /dev/null +++ b/graph/incidents_graphml/d/db062040-bcf3-11ed-9421-6db30872eff3.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.86.51 + 100.64.86.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678199105 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + db062040-bcf3-11ed-9421-6db30872eff3 + + + INCIDENT_LINK + 1678199105 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + db062040-bcf3-11ed-9421-6db30872eff3 + + + diff --git a/graph/incidents_graphml/d/db066cd0-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/d/db066cd0-3b83-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72ac361a8f8c94b4d50042d73a0dfcc979840cf9 --- /dev/null +++ b/graph/incidents_graphml/d/db066cd0-3b83-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.101 + 100.64.62.101 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692114799 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + db066cd0-3b83-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/d/db585700-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/d/db585700-2f46-11ee-8421-f3eff1a35bff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c9910ee6efb11046e860395a7810b1c442d2eb1 --- /dev/null +++ b/graph/incidents_graphml/d/db585700-2f46-11ee-8421-f3eff1a35bff.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.81 + 100.64.73.81 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.68.225 + 100.64.68.225 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.23.183 + 100.64.23.183 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.127 + 100.64.76.127 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690769187 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + db585700-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769187 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + db585700-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769187 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + db585700-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769187 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + db585700-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769187 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + db585700-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769187 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + db585700-2f46-11ee-8421-f3eff1a35bff + + + diff --git a/graph/incidents_graphml/d/db7f84a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml b/graph/incidents_graphml/d/db7f84a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d4c17a946ac3897bfb379c8476b1341c41262e2 --- /dev/null +++ b/graph/incidents_graphml/d/db7f84a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.166 + 100.64.74.166 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1680126687 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db7f84a0-ce7b-11ed-9e5b-155bf57fc5c4 + + + diff --git a/graph/incidents_graphml/d/db8466a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml b/graph/incidents_graphml/d/db8466a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e77ae78b6b8d44d6951cc0e7ee0e7a0da3015fc --- /dev/null +++ b/graph/incidents_graphml/d/db8466a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.74.166 + 100.64.74.166 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1680126687 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + db8466a0-ce7b-11ed-9e5b-155bf57fc5c4 + + + diff --git a/graph/incidents_graphml/d/db8694a0-30ec-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/d/db8694a0-30ec-11ef-bae8-75e6361c756f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..510e96208b950016ca0d39449440198ce604b941 --- /dev/null +++ b/graph/incidents_graphml/d/db8694a0-30ec-11ef-bae8-75e6361c756f.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.40 + 100.64.53.40 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.170 + USER-0015-1399.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.41 + 100.64.53.41 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.42 + 100.64.53.42 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.43 + USER-0015-1400.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.61 + 100.64.49.61 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.161 + 100.64.24.161 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.44 + 100.64.53.44 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719097932 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + db8694a0-30ec-11ef-bae8-75e6361c756f + + + diff --git a/graph/incidents_graphml/d/db99b0c0-780b-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/d/db99b0c0-780b-11ee-a719-91c3184b15ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..145a386e15605c2f41d40c1cbd063ee1bc469c12 --- /dev/null +++ b/graph/incidents_graphml/d/db99b0c0-780b-11ee-a719-91c3184b15ab.graphml @@ -0,0 +1,753 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.193 + 100.64.12.193 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.162 + 100.64.19.162 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.163 + 100.64.19.163 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.164 + 100.64.19.164 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.165 + 100.64.19.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.166 + 100.64.19.166 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.167 + 100.64.19.167 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.168 + 100.64.19.168 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.169 + 100.64.19.169 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.170 + 100.64.19.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.171 + 100.64.19.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.80 + 100.64.8.80 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.172 + 100.64.19.172 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.173 + 100.64.19.173 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.134 + 100.64.11.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + INCIDENT_LINK + 1698770282 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db99b0c0-780b-11ee-a719-91c3184b15ab + + + diff --git a/graph/incidents_graphml/d/db9b2a60-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/db9b2a60-1b7b-11ed-8ae2-15a147a6b00c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..936f5583311e5472235718e8867ae8888d6ae604 --- /dev/null +++ b/graph/incidents_graphml/d/db9b2a60-1b7b-11ed-8ae2-15a147a6b00c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.140 + 100.64.80.140 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660445429 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + db9b2a60-1b7b-11ed-8ae2-15a147a6b00c + + + diff --git a/graph/incidents_graphml/d/dbad2bc0-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/dbad2bc0-1b7b-11ed-8ae2-15a147a6b00c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b14a9bd77ddbf667b39994a9e3670228034935b9 --- /dev/null +++ b/graph/incidents_graphml/d/dbad2bc0-1b7b-11ed-8ae2-15a147a6b00c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.140 + 100.64.80.140 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660445429 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dbad2bc0-1b7b-11ed-8ae2-15a147a6b00c + + + diff --git a/graph/incidents_graphml/d/dbadc3d0-ed78-11ed-a662-a9c0e7c292a4.graphml b/graph/incidents_graphml/d/dbadc3d0-ed78-11ed-a662-a9c0e7c292a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d8818a2f6c5b90989ead9767d62eda03896a247 --- /dev/null +++ b/graph/incidents_graphml/d/dbadc3d0-ed78-11ed-a662-a9c0e7c292a4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.186 + 100.64.68.186 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1683533885 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbadc3d0-ed78-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683533885 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbadc3d0-ed78-11ed-a662-a9c0e7c292a4 + + + diff --git a/graph/incidents_graphml/d/dbba2410-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/dbba2410-1b7b-11ed-8ae2-15a147a6b00c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5493a4fc3adc815147e39e161998a10bc0fd72e0 --- /dev/null +++ b/graph/incidents_graphml/d/dbba2410-1b7b-11ed-8ae2-15a147a6b00c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.37 + 100.64.1.37 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.7.197 + 100.64.7.197 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660445429 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + dbba2410-1b7b-11ed-8ae2-15a147a6b00c + + + INCIDENT_LINK + 1660445429 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + dbba2410-1b7b-11ed-8ae2-15a147a6b00c + + + diff --git a/graph/incidents_graphml/d/dbbc80d0-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/d/dbbc80d0-138b-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d2fbf6a248592018d02234c280d0ab0d7e12a7b --- /dev/null +++ b/graph/incidents_graphml/d/dbbc80d0-138b-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.85 + 100.64.74.85 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.58 + 100.64.73.58 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687720190 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbbc80d0-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720190 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbbc80d0-138b-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/d/dbbf0610-1b7b-11ed-8ae2-15a147a6b00c.graphml b/graph/incidents_graphml/d/dbbf0610-1b7b-11ed-8ae2-15a147a6b00c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8150501215fe7515c1d16543dd02baf12cc6b81 --- /dev/null +++ b/graph/incidents_graphml/d/dbbf0610-1b7b-11ed-8ae2-15a147a6b00c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.51 + 100.64.72.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.13.216 + 100.64.13.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660445430 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dbbf0610-1b7b-11ed-8ae2-15a147a6b00c + + + diff --git a/graph/incidents_graphml/d/dbc23380-076a-11ef-93a8-d78cfa287885.graphml b/graph/incidents_graphml/d/dbc23380-076a-11ef-93a8-d78cfa287885.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7e76b12c7084d7ae4ac8c9bf7b17250fccebf2e --- /dev/null +++ b/graph/incidents_graphml/d/dbc23380-076a-11ef-93a8-d78cfa287885.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.179.188 + 172.29.179.188 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.94.9 + 100.64.94.9 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714534100 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbc23380-076a-11ef-93a8-d78cfa287885 + + + INCIDENT_LINK + 1714534100 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbc23380-076a-11ef-93a8-d78cfa287885 + + + diff --git a/graph/incidents_graphml/d/dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf.graphml b/graph/incidents_graphml/d/dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5372cc2abcfbebf57451e15414f7495b34de689 --- /dev/null +++ b/graph/incidents_graphml/d/dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.69 + 100.64.62.69 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.205 + 100.64.62.205 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.62 + 100.64.22.62 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.193 + 100.64.12.193 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.10 + 100.64.37.10 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.61 + 100.64.28.61 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.81 + 100.64.47.81 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.206 + 100.64.62.206 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.243 + 100.64.30.243 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.207 + 100.64.62.207 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.208 + 100.64.62.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.212 + 100.64.54.212 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.209 + 100.64.62.209 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.89 + 100.64.26.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.210 + 100.64.62.210 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.150 + 100.64.15.150 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.211 + 100.64.62.211 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + INCIDENT_LINK + 1691593821 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbc8d2a0-36c6-11ee-b2fc-7d6cdcd897bf + + + diff --git a/graph/incidents_graphml/d/dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/d/dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64158a6534aa66faee8aaa407dc198efebc8a35c --- /dev/null +++ b/graph/incidents_graphml/d/dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.243 + 100.64.18.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.35.79 + 100.64.35.79 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.80 + 100.64.35.80 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.81 + 100.64.35.81 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.35.82 + 100.64.35.82 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.50 + 100.64.9.50 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.191 + 100.64.27.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.22.7 + 100.64.22.7 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150082 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dbcdbc00-fc2b-11ed-b0ec-2b4cf5491294 + + + diff --git a/graph/incidents_graphml/d/dbe61090-fb1b-11ed-895b-69b7bcd870e2.graphml b/graph/incidents_graphml/d/dbe61090-fb1b-11ed-895b-69b7bcd870e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d88b983805b4ac9c042e56a6d9c5430368df79a --- /dev/null +++ b/graph/incidents_graphml/d/dbe61090-fb1b-11ed-895b-69b7bcd870e2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.104 + 100.64.51.104 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685033259 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dbe61090-fb1b-11ed-895b-69b7bcd870e2 + + + diff --git a/graph/incidents_graphml/d/dc035c90-fb1b-11ed-895b-69b7bcd870e2.graphml b/graph/incidents_graphml/d/dc035c90-fb1b-11ed-895b-69b7bcd870e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11e2e8e0681d21b6cf67b307c7c0c70fda108efb --- /dev/null +++ b/graph/incidents_graphml/d/dc035c90-fb1b-11ed-895b-69b7bcd870e2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.51.104 + 100.64.51.104 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685033259 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dc035c90-fb1b-11ed-895b-69b7bcd870e2 + + + diff --git a/graph/incidents_graphml/d/dc1e7390-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/dc1e7390-295b-11ee-af70-f9ca9a13f131.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5406cbcbeacf8da4d5ac08999b5a9d8082b877e --- /dev/null +++ b/graph/incidents_graphml/d/dc1e7390-295b-11ee-af70-f9ca9a13f131.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.101 + 100.64.50.101 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690118500 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dc1e7390-295b-11ee-af70-f9ca9a13f131 + + + diff --git a/graph/incidents_graphml/d/dc2896d0-1601-11ee-b5b0-23eb7b8b596d.graphml b/graph/incidents_graphml/d/dc2896d0-1601-11ee-b5b0-23eb7b8b596d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11880a7a7166a2a91f5c973a7160013668ab0b70 --- /dev/null +++ b/graph/incidents_graphml/d/dc2896d0-1601-11ee-b5b0-23eb7b8b596d.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.218 + USER-0015-1275.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.157 + 100.64.59.157 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.158 + 100.64.59.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687990774 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc2896d0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990774 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc2896d0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990774 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc2896d0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990774 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc2896d0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990774 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc2896d0-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990774 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc2896d0-1601-11ee-b5b0-23eb7b8b596d + + + diff --git a/graph/incidents_graphml/d/dc414680-fe69-11ed-a136-877286d930e4.graphml b/graph/incidents_graphml/d/dc414680-fe69-11ed-a136-877286d930e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f2ce13f577c506b9cd920308f57db12cd32a91d4 --- /dev/null +++ b/graph/incidents_graphml/d/dc414680-fe69-11ed-a136-877286d930e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.105 + 100.64.7.105 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685396614 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc414680-fe69-11ed-a136-877286d930e4 + + + diff --git a/graph/incidents_graphml/d/dc559b40-fb1b-11ed-895b-69b7bcd870e2.graphml b/graph/incidents_graphml/d/dc559b40-fb1b-11ed-895b-69b7bcd870e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa5eb0de92198cb7574fda1b034c86b13b421bed --- /dev/null +++ b/graph/incidents_graphml/d/dc559b40-fb1b-11ed-895b-69b7bcd870e2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.105 + 100.64.36.105 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685033259 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dc559b40-fb1b-11ed-895b-69b7bcd870e2 + + + diff --git a/graph/incidents_graphml/d/dc5ba080-8559-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/d/dc5ba080-8559-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9cf0cf56ce618a5f7ce62095437cf5ca6b9dc47 --- /dev/null +++ b/graph/incidents_graphml/d/dc5ba080-8559-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.103 + 100.64.31.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700233149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dc5ba080-8559-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/d/dc6f76a0-8559-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/d/dc6f76a0-8559-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1ed7e9781884428524233e291ba892da82e6095 --- /dev/null +++ b/graph/incidents_graphml/d/dc6f76a0-8559-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.103 + 100.64.31.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700233149 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dc6f76a0-8559-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/d/dc820300-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/d/dc820300-13f4-11ee-9bb8-6b8312f57fd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3af57f044ed877f22ae57170917223af03f3622b --- /dev/null +++ b/graph/incidents_graphml/d/dc820300-13f4-11ee-9bb8-6b8312f57fd1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.226 + 100.64.72.226 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.196 + 100.64.72.196 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687765288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dc820300-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dc820300-13f4-11ee-9bb8-6b8312f57fd1 + + + diff --git a/graph/incidents_graphml/d/dc821440-8559-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/d/dc821440-8559-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f21f41bde672e4b02d9cc491cd715f7c2726de4c --- /dev/null +++ b/graph/incidents_graphml/d/dc821440-8559-11ee-823e-1956338371c0.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.105 + 100.64.31.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.106 + 100.64.31.106 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.107 + 100.64.31.107 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.108 + 100.64.31.108 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.109 + 100.64.31.109 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.124 + 100.64.25.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.51 + 100.64.19.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.110 + 100.64.31.110 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.111 + 100.64.31.111 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.112 + 100.64.31.112 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.87 + 100.64.31.87 + [] + 0.578125 + ["Precinct"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.233 + 100.64.20.233 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.113 + 100.64.31.113 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.114 + 100.64.31.114 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.50 + 100.64.9.50 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.115 + 100.64.31.115 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.116 + 100.64.31.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.117 + 100.64.31.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.234 + 100.64.9.234 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700233149 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc821440-8559-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/d/dc8d8780-d3dd-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/d/dc8d8780-d3dd-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5ba633c664ff7e6cdc845c204b3e73a5616f4ae --- /dev/null +++ b/graph/incidents_graphml/d/dc8d8780-d3dd-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.162 + 100.64.40.162 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708866033 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc8d8780-d3dd-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/d/dc9711a0-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/d/dc9711a0-13f4-11ee-9bb8-6b8312f57fd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81e7fedc8e575085727dbd273d61e9ff6146cfef --- /dev/null +++ b/graph/incidents_graphml/d/dc9711a0-13f4-11ee-9bb8-6b8312f57fd1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.227 + 100.64.72.227 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.41 + 100.64.72.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687765288 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc9711a0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765288 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dc9711a0-13f4-11ee-9bb8-6b8312f57fd1 + + + diff --git a/graph/incidents_graphml/d/dca06760-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/d/dca06760-2f46-11ee-8421-f3eff1a35bff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..460e079c25ebc1617f16ec53d800d84f915109d2 --- /dev/null +++ b/graph/incidents_graphml/d/dca06760-2f46-11ee-8421-f3eff1a35bff.graphml @@ -0,0 +1,459 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.7 + 100.64.22.7 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.109 + 100.64.72.109 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.14.83 + 100.64.14.83 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.19.247 + USER-0015-1735.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.25.188 + 100.64.25.188 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.128 + 100.64.76.128 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.130 + 100.64.72.130 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.12.246 + 100.64.12.246 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.5 + 100.64.74.5 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.13.133 + 100.64.13.133 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.12.60 + 100.64.12.60 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769189 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca06760-2f46-11ee-8421-f3eff1a35bff + + + diff --git a/graph/incidents_graphml/d/dca272c0-0859-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/d/dca272c0-0859-11ef-81c9-bbab78bb4e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa889ea7ff8e4e401bbef251f2f8644a73071ef2 --- /dev/null +++ b/graph/incidents_graphml/d/dca272c0-0859-11ef-81c9-bbab78bb4e36.graphml @@ -0,0 +1,241 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.841796875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.185 + 100.64.97.185 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 172.16.46.208 + 172.16.46.208 + ["Exploiting Host"] + 0.841796875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.186 + 100.64.97.186 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.187 + USER-0015-2174.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1714636752 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca272c0-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636752 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca272c0-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636752 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca272c0-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636752 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca272c0-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636752 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca272c0-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636752 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca272c0-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636752 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca272c0-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636752 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca272c0-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636752 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca272c0-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636752 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca272c0-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636752 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca272c0-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636752 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca272c0-0859-11ef-81c9-bbab78bb4e36 + + + diff --git a/graph/incidents_graphml/d/dca5b060-efe8-11ec-a293-5b334d10f0f6.graphml b/graph/incidents_graphml/d/dca5b060-efe8-11ec-a293-5b334d10f0f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5258f9f7d131339998313e7936e043fda9aef523 --- /dev/null +++ b/graph/incidents_graphml/d/dca5b060-efe8-11ec-a293-5b334d10f0f6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.194 + 100.64.81.194 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.250 + 100.64.70.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655654395 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca5b060-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654395 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dca5b060-efe8-11ec-a293-5b334d10f0f6 + + + diff --git a/graph/incidents_graphml/d/dcbe8f90-efe8-11ec-a293-5b334d10f0f6.graphml b/graph/incidents_graphml/d/dcbe8f90-efe8-11ec-a293-5b334d10f0f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a67bd402c0ce5ab483fb3438dbe5481547c678b5 --- /dev/null +++ b/graph/incidents_graphml/d/dcbe8f90-efe8-11ec-a293-5b334d10f0f6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.195 + 100.64.81.195 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.77 + 100.64.72.77 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655654395 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dcbe8f90-efe8-11ec-a293-5b334d10f0f6 + + + INCIDENT_LINK + 1655654395 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dcbe8f90-efe8-11ec-a293-5b334d10f0f6 + + + diff --git a/graph/incidents_graphml/d/dcc33840-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/dcc33840-6e29-11ee-b3d5-39e2e796f8b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a6a6db131bd0afaba3ac392622b65b934cb3074 --- /dev/null +++ b/graph/incidents_graphml/d/dcc33840-6e29-11ee-b3d5-39e2e796f8b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.64 + 100.64.9.64 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697683657 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dcc33840-6e29-11ee-b3d5-39e2e796f8b3 + + + diff --git a/graph/incidents_graphml/d/dcd27a80-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/dcd27a80-6e29-11ee-b3d5-39e2e796f8b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a0224efa5b7103d423fa09548841aaad9f32e09 --- /dev/null +++ b/graph/incidents_graphml/d/dcd27a80-6e29-11ee-b3d5-39e2e796f8b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.64 + 100.64.9.64 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697683657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dcd27a80-6e29-11ee-b3d5-39e2e796f8b3 + + + diff --git a/graph/incidents_graphml/d/dcde7860-1c9b-11ee-baac-abb351177483.graphml b/graph/incidents_graphml/d/dcde7860-1c9b-11ee-baac-abb351177483.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eca35af34c4328e98a11305a132f2c0ced1e3e82 --- /dev/null +++ b/graph/incidents_graphml/d/dcde7860-1c9b-11ee-baac-abb351177483.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.162 + 100.64.9.162 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688716624 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dcde7860-1c9b-11ee-baac-abb351177483 + + + diff --git a/graph/incidents_graphml/d/dce0f970-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/dce0f970-6e29-11ee-b3d5-39e2e796f8b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e211b192f4d16987ab3954a3516f6dc688f0dc2 --- /dev/null +++ b/graph/incidents_graphml/d/dce0f970-6e29-11ee-b3d5-39e2e796f8b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.202 + 100.64.51.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697683657 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dce0f970-6e29-11ee-b3d5-39e2e796f8b3 + + + diff --git a/graph/incidents_graphml/d/dce8eea0-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/dce8eea0-9562-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..799faa330de8fdcfd03b38af64ecca3343cf24a5 --- /dev/null +++ b/graph/incidents_graphml/d/dce8eea0-9562-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.166 + 100.64.78.166 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.255 + 100.64.75.255 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.78.167 + 100.64.78.167 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1673848736 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dce8eea0-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848736 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dce8eea0-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848736 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dce8eea0-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848736 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dce8eea0-9562-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/d/dceac360-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/dceac360-9562-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3fd0e67358423fb05a3616ddec744e4a15b1a3b5 --- /dev/null +++ b/graph/incidents_graphml/d/dceac360-9562-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.168 + 100.64.78.168 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.181 + 100.64.75.181 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.78.169 + 100.64.78.169 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1673848736 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dceac360-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848736 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dceac360-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848736 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dceac360-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848736 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dceac360-9562-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/d/dceb53f0-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/dceb53f0-57d3-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7278a6bd365fcec1c60def3c5be6e7236c16eb3 --- /dev/null +++ b/graph/incidents_graphml/d/dceb53f0-57d3-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.22 + 100.64.61.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695227795 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dceb53f0-57d3-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/d/dcef0330-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/dcef0330-6e29-11ee-b3d5-39e2e796f8b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb4ffedad2e3ede873e3a00359cfee5f5bf6b9a4 --- /dev/null +++ b/graph/incidents_graphml/d/dcef0330-6e29-11ee-b3d5-39e2e796f8b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.202 + 100.64.51.202 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697683657 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dcef0330-6e29-11ee-b3d5-39e2e796f8b3 + + + diff --git a/graph/incidents_graphml/d/dcf00470-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/d/dcf00470-5b2c-11ee-a5b1-e563b721d2c6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50623df692a6a82c55dccbfe80f82aaa3e2d9d9c --- /dev/null +++ b/graph/incidents_graphml/d/dcf00470-5b2c-11ee-a5b1-e563b721d2c6.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.169 + 100.64.68.169 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"] + + + HOST + 100.64.68.170 + 100.64.68.170 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.171 + 100.64.68.171 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.172 + 100.64.68.172 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695595873 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dcf00470-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595873 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dcf00470-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595873 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dcf00470-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595873 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dcf00470-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595873 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dcf00470-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595873 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dcf00470-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595873 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dcf00470-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595873 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dcf00470-5b2c-11ee-a5b1-e563b721d2c6 + + + diff --git a/graph/incidents_graphml/d/dcf2a4d0-f770-11ec-b122-cb097d636325.graphml b/graph/incidents_graphml/d/dcf2a4d0-f770-11ec-b122-cb097d636325.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30264b541179d64411d7c5e28f668778113c185f --- /dev/null +++ b/graph/incidents_graphml/d/dcf2a4d0-f770-11ec-b122-cb097d636325.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.2 + 100.64.17.2 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.166 + USER-0015-1615.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656482465 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dcf2a4d0-f770-11ec-b122-cb097d636325 + + + INCIDENT_LINK + 1656482465 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dcf2a4d0-f770-11ec-b122-cb097d636325 + + + diff --git a/graph/incidents_graphml/d/dcf2dcb0-0859-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/d/dcf2dcb0-0859-11ef-81c9-bbab78bb4e36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d2100d2647e787c446b8ce1a8f73c223c611e07 --- /dev/null +++ b/graph/incidents_graphml/d/dcf2dcb0-0859-11ef-81c9-bbab78bb4e36.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.179.188 + 172.29.179.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.89.13 + 100.64.89.13 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714636752 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dcf2dcb0-0859-11ef-81c9-bbab78bb4e36 + + + INCIDENT_LINK + 1714636752 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dcf2dcb0-0859-11ef-81c9-bbab78bb4e36 + + + diff --git a/graph/incidents_graphml/d/dcf82530-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/dcf82530-57d3-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ff15a8caeb4ab512844da355b7fa40af7ae6673 --- /dev/null +++ b/graph/incidents_graphml/d/dcf82530-57d3-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.22 + 100.64.61.22 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695227795 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dcf82530-57d3-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/d/dcfefde0-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/dcfefde0-7bc0-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ebf1b727377365a783f46176135f57bb0f950c0 --- /dev/null +++ b/graph/incidents_graphml/d/dcfefde0-7bc0-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.139 + 100.64.26.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699177876 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dcfefde0-7bc0-11ee-bf1f-2f975ac76263 + + + INCIDENT_LINK + 1699177876 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dcfefde0-7bc0-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/d/dd040c10-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/dd040c10-57d3-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d739bfb8529e5de48d405108c4b24837723095b8 --- /dev/null +++ b/graph/incidents_graphml/d/dd040c10-57d3-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.242 + 100.64.12.242 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695227795 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dd040c10-57d3-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/d/dd0691f0-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dd0691f0-5392-11ee-8b4b-a5c1684d0e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2ac874a35a129ead95a61fbd589fbae0683eb19 --- /dev/null +++ b/graph/incidents_graphml/d/dd0691f0-5392-11ee-8b4b-a5c1684d0e53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.63 + 100.64.49.63 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694760073 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dd0691f0-5392-11ee-8b4b-a5c1684d0e53 + + + diff --git a/graph/incidents_graphml/d/dd117990-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/dd117990-57d3-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77f6f2fee39f49f748dfe1704ed9c33566eb07fa --- /dev/null +++ b/graph/incidents_graphml/d/dd117990-57d3-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.242 + 100.64.12.242 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695227795 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + dd117990-57d3-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/d/dd140c80-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/dd140c80-7bc0-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e851547523211829d9ad8b93df16e810b7adda2 --- /dev/null +++ b/graph/incidents_graphml/d/dd140c80-7bc0-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.139 + 100.64.26.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699177876 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + dd140c80-7bc0-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/d/dd16be90-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dd16be90-5392-11ee-8b4b-a5c1684d0e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15ebb106a392413575759c6ed71d4a1b68c6456d --- /dev/null +++ b/graph/incidents_graphml/d/dd16be90-5392-11ee-8b4b-a5c1684d0e53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.63 + 100.64.49.63 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694760073 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dd16be90-5392-11ee-8b4b-a5c1684d0e53 + + + diff --git a/graph/incidents_graphml/d/dd1a19f0-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/dd1a19f0-b752-11ed-808d-57d97cd084e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..596abad4e6442b7ddae34ef4d086b467768637ea --- /dev/null +++ b/graph/incidents_graphml/d/dd1a19f0-b752-11ed-808d-57d97cd084e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.141 + 100.64.92.141 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1677580204 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dd1a19f0-b752-11ed-808d-57d97cd084e1 + + + diff --git a/graph/incidents_graphml/d/dd247a30-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dd247a30-5392-11ee-8b4b-a5c1684d0e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37250101b64a3e8566726bdbcf5606032dfc87e5 --- /dev/null +++ b/graph/incidents_graphml/d/dd247a30-5392-11ee-8b4b-a5c1684d0e53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.153 + 100.64.30.153 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694760073 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dd247a30-5392-11ee-8b4b-a5c1684d0e53 + + + diff --git a/graph/incidents_graphml/d/dd27ae80-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/dd27ae80-b752-11ed-808d-57d97cd084e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a015c46b6b77912e62cb26f9ee7570243b83e02 --- /dev/null +++ b/graph/incidents_graphml/d/dd27ae80-b752-11ed-808d-57d97cd084e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.141 + 100.64.92.141 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677580204 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd27ae80-b752-11ed-808d-57d97cd084e1 + + + diff --git a/graph/incidents_graphml/d/dd2a6da0-b752-11ed-808d-57d97cd084e1.graphml b/graph/incidents_graphml/d/dd2a6da0-b752-11ed-808d-57d97cd084e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da6ea67d8a62df39d44a4048cd55583e3ca7ec8c --- /dev/null +++ b/graph/incidents_graphml/d/dd2a6da0-b752-11ed-808d-57d97cd084e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1976.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.92.143 + 100.64.92.143 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1677580204 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dd2a6da0-b752-11ed-808d-57d97cd084e1 + + + diff --git a/graph/incidents_graphml/d/dd2fab00-15b4-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/d/dd2fab00-15b4-11ef-8b2e-b54e20f7e466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d100a6663b2cf964e455b8cd087f68b4611ac842 --- /dev/null +++ b/graph/incidents_graphml/d/dd2fab00-15b4-11ef-8b2e-b54e20f7e466.graphml @@ -0,0 +1,437 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.16 + 100.64.60.16 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.95.63 + 100.64.95.63 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.220 + 100.64.4.220 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.64 + 100.64.95.64 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.165 + 100.64.10.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.135 + 100.64.50.135 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.65 + USER-0015-2125.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.66 + 100.64.95.66 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.120 + 100.64.64.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.67 + USER-0015-2126.example.internal + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.11 + 100.64.33.11 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105202 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd2fab00-15b4-11ef-8b2e-b54e20f7e466 + + + diff --git a/graph/incidents_graphml/d/dd3696f0-1a8c-11ee-a9ef-735ae64b5bd4.graphml b/graph/incidents_graphml/d/dd3696f0-1a8c-11ee-a9ef-735ae64b5bd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..130156ca0001901b6e8ed5777b78968a03613209 --- /dev/null +++ b/graph/incidents_graphml/d/dd3696f0-1a8c-11ee-a9ef-735ae64b5bd4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.4 + 100.64.72.4 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688490280 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd3696f0-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490280 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dd3696f0-1a8c-11ee-a9ef-735ae64b5bd4 + + + diff --git a/graph/incidents_graphml/d/dd371500-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/d/dd371500-92f9-11ed-844e-b1b9f26efb97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4de3e218f328aa99643179064fae0c09c4ea74fb --- /dev/null +++ b/graph/incidents_graphml/d/dd371500-92f9-11ed-844e-b1b9f26efb97.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + USER-0015-1968.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1673583737 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dd371500-92f9-11ed-844e-b1b9f26efb97 + + + diff --git a/graph/incidents_graphml/d/dd393ab0-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dd393ab0-5392-11ee-8b4b-a5c1684d0e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86de0cafc3a6b93558181520aacd1a46ccfc5d21 --- /dev/null +++ b/graph/incidents_graphml/d/dd393ab0-5392-11ee-8b4b-a5c1684d0e53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.153 + 100.64.30.153 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694760073 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + dd393ab0-5392-11ee-8b4b-a5c1684d0e53 + + + diff --git a/graph/incidents_graphml/d/dd3c9340-92f9-11ed-844e-b1b9f26efb97.graphml b/graph/incidents_graphml/d/dd3c9340-92f9-11ed-844e-b1b9f26efb97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84d4412cd0081f83c909e4864219da6a4f3422b6 --- /dev/null +++ b/graph/incidents_graphml/d/dd3c9340-92f9-11ed-844e-b1b9f26efb97.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1968.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1673583737 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dd3c9340-92f9-11ed-844e-b1b9f26efb97 + + + diff --git a/graph/incidents_graphml/d/dd474470-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dd474470-5392-11ee-8b4b-a5c1684d0e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c463d41a6d9ff11670e9c66ce0909a3799866c2 --- /dev/null +++ b/graph/incidents_graphml/d/dd474470-5392-11ee-8b4b-a5c1684d0e53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.65 + 100.64.49.65 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694760073 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dd474470-5392-11ee-8b4b-a5c1684d0e53 + + + diff --git a/graph/incidents_graphml/d/dd500410-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/dd500410-7bc0-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a103b19ab67eaf348983b25e04826400170fbdc --- /dev/null +++ b/graph/incidents_graphml/d/dd500410-7bc0-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 192.0.2.182 + 192.0.2.182 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699177877 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dd500410-7bc0-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/d/dd577110-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dd577110-5392-11ee-8b4b-a5c1684d0e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..01516e186540f612fc9053fe6d9441f5a8a8f292 --- /dev/null +++ b/graph/incidents_graphml/d/dd577110-5392-11ee-8b4b-a5c1684d0e53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.65 + 100.64.49.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694760073 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dd577110-5392-11ee-8b4b-a5c1684d0e53 + + + diff --git a/graph/incidents_graphml/d/dd751340-dd9f-11ee-b481-81f382d6ce1b.graphml b/graph/incidents_graphml/d/dd751340-dd9f-11ee-b481-81f382d6ce1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0954ca6a804f3bfba0b8f8bc3aea08dbb4035eae --- /dev/null +++ b/graph/incidents_graphml/d/dd751340-dd9f-11ee-b481-81f382d6ce1b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.60 + 100.64.31.60 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1709938918 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dd751340-dd9f-11ee-b481-81f382d6ce1b + + + diff --git a/graph/incidents_graphml/d/dd753f50-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/dd753f50-7bc0-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..87b6786a48b71c61a27bfcdbfd82c7f3c2444f5a --- /dev/null +++ b/graph/incidents_graphml/d/dd753f50-7bc0-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.46 + 100.64.67.46 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699177877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + dd753f50-7bc0-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/d/dd7a33f0-533c-11ed-82ec-e7a72760a0c9.graphml b/graph/incidents_graphml/d/dd7a33f0-533c-11ed-82ec-e7a72760a0c9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c395e8fd157c1ff0f51931bce6e98c92868e96a --- /dev/null +++ b/graph/incidents_graphml/d/dd7a33f0-533c-11ed-82ec-e7a72760a0c9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.57 + 100.64.95.57 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1666575639 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dd7a33f0-533c-11ed-82ec-e7a72760a0c9 + + + diff --git a/graph/incidents_graphml/d/dd93c2d0-f0fb-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/d/dd93c2d0-f0fb-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..524873560bb92fbb3d60e3a5a62d43d4047f7353 --- /dev/null +++ b/graph/incidents_graphml/d/dd93c2d0-f0fb-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.168 + 100.64.25.168 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712067504 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dd93c2d0-f0fb-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/d/ddb028a0-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/d/ddb028a0-2da4-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..252491325c589798a455a070e339a0c4146c9d49 --- /dev/null +++ b/graph/incidents_graphml/d/ddb028a0-2da4-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.169 + 100.64.37.169 + ["Exploiting Host"] + 0.7525 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690589661 + malicious + 0.7525 + 0.7525 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ddb028a0-2da4-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/d/ddb407b0-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/ddb407b0-295b-11ee-af70-f9ca9a13f131.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd32453ca47066b08245f8552220396a8606e0c6 --- /dev/null +++ b/graph/incidents_graphml/d/ddb407b0-295b-11ee-af70-f9ca9a13f131.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.104 + 100.64.6.104 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690118503 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ddb407b0-295b-11ee-af70-f9ca9a13f131 + + + diff --git a/graph/incidents_graphml/d/ddb72360-eb97-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/d/ddb72360-eb97-11ee-8f3a-6b2412cfa52f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..122f17fa356d450e68f3754bc940531fae9436a8 --- /dev/null +++ b/graph/incidents_graphml/d/ddb72360-eb97-11ee-8f3a-6b2412cfa52f.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.161 + 100.64.23.161 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.70.24 + 100.64.70.24 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711474798 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ddb72360-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474798 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ddb72360-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474798 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ddb72360-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474798 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ddb72360-eb97-11ee-8f3a-6b2412cfa52f + + + diff --git a/graph/incidents_graphml/d/ddb814b0-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/ddb814b0-7bc0-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1aaebd2dd437bb1335754737f095b91615f0248 --- /dev/null +++ b/graph/incidents_graphml/d/ddb814b0-7bc0-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.48 + 100.64.67.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699177877 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ddb814b0-7bc0-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/d/ddc45c20-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/d/ddc45c20-9773-11ed-8e25-218966643970.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e04e19492c4d95ea19863ee37091ae85f079fee --- /dev/null +++ b/graph/incidents_graphml/d/ddc45c20-9773-11ed-8e25-218966643970.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.254 + 100.64.81.254 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.60 + 100.64.73.60 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1674075941 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ddc45c20-9773-11ed-8e25-218966643970 + + + INCIDENT_LINK + 1674075941 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ddc45c20-9773-11ed-8e25-218966643970 + + + diff --git a/graph/incidents_graphml/d/ddc9d9a0-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/ddc9d9a0-295b-11ee-af70-f9ca9a13f131.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7329af2db8732e62168181961b6905e470413f8f --- /dev/null +++ b/graph/incidents_graphml/d/ddc9d9a0-295b-11ee-af70-f9ca9a13f131.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.104 + 100.64.6.104 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690118503 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ddc9d9a0-295b-11ee-af70-f9ca9a13f131 + + + diff --git a/graph/incidents_graphml/d/ddcb2780-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/ddcb2780-7bc0-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd3f44e5cf7560c4c6f0e6bcc74810a898463ee9 --- /dev/null +++ b/graph/incidents_graphml/d/ddcb2780-7bc0-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.48 + 100.64.67.48 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699177878 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ddcb2780-7bc0-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/d/ddd6c370-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/d/ddd6c370-2da4-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..881887ee95bcb65f67a14e1a24781811fe160f8d --- /dev/null +++ b/graph/incidents_graphml/d/ddd6c370-2da4-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.169 + 100.64.37.169 + ["Exploiting Host"] + 0.7525 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690589661 + malicious + 0.7525 + 0.7525 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ddd6c370-2da4-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/d/ddda5460-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/ddda5460-295b-11ee-af70-f9ca9a13f131.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eee1b9a308d89b372e8c4fff05f182bffe3ac4ac --- /dev/null +++ b/graph/incidents_graphml/d/ddda5460-295b-11ee-af70-f9ca9a13f131.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.216 + USER-0015-1480.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690118503 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ddda5460-295b-11ee-af70-f9ca9a13f131 + + + diff --git a/graph/incidents_graphml/d/dddc9740-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/d/dddc9740-3b83-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab745a7b5126c6ea6c498c3714d0ee7fc68c3aaa --- /dev/null +++ b/graph/incidents_graphml/d/dddc9740-3b83-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.195 + 100.64.6.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692114804 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dddc9740-3b83-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/d/dddce950-8559-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/d/dddce950-8559-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..079863f23473828706224fa722c5bfb37de7a6d3 --- /dev/null +++ b/graph/incidents_graphml/d/dddce950-8559-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.135 + 100.64.31.135 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700233151 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dddce950-8559-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/d/dde0fe90-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/dde0fe90-57d3-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3cc11d5d98419f8d749b69bdcd31dacb1a820b8 --- /dev/null +++ b/graph/incidents_graphml/d/dde0fe90-57d3-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.217 + 100.64.24.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695227796 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dde0fe90-57d3-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/d/dde224e0-5392-11ee-8b4b-a5c1684d0e53.graphml b/graph/incidents_graphml/d/dde224e0-5392-11ee-8b4b-a5c1684d0e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17ce6127d1d1205b4ca3c5ef1c770ee16d103d57 --- /dev/null +++ b/graph/incidents_graphml/d/dde224e0-5392-11ee-8b4b-a5c1684d0e53.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.83 + 100.64.11.83 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694760074 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dde224e0-5392-11ee-8b4b-a5c1684d0e53 + + + diff --git a/graph/incidents_graphml/d/ddef1560-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/ddef1560-3452-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e1c64856d1a081741f59d94778aa449efdc15ca --- /dev/null +++ b/graph/incidents_graphml/d/ddef1560-3452-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.213 + 100.64.28.213 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691324101 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ddef1560-3452-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/ddf27040-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/ddf27040-295b-11ee-af70-f9ca9a13f131.graphml new file mode 100644 index 0000000000000000000000000000000000000000..379e7dfbfbcc3b882d65353f773287e2df9588f8 --- /dev/null +++ b/graph/incidents_graphml/d/ddf27040-295b-11ee-af70-f9ca9a13f131.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.216 + USER-0015-1480.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690118503 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ddf27040-295b-11ee-af70-f9ca9a13f131 + + + diff --git a/graph/incidents_graphml/d/ddf66ca0-9c29-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/d/ddf66ca0-9c29-11ed-a223-eb3483e385f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7eb6b4ea825e3061269089978066c0dca7b46bf4 --- /dev/null +++ b/graph/incidents_graphml/d/ddf66ca0-9c29-11ed-a223-eb3483e385f1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.28 + 100.64.1.28 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.131 + 100.64.72.131 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1674593914 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + ddf66ca0-9c29-11ed-a223-eb3483e385f1 + + + diff --git a/graph/incidents_graphml/d/ddfd65b0-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/d/ddfd65b0-3b83-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df10195892b3157f69398eb60f3ab50f8f43d47b --- /dev/null +++ b/graph/incidents_graphml/d/ddfd65b0-3b83-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.195 + 100.64.6.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692114804 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ddfd65b0-3b83-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/d/de002ff0-fe91-11ec-809e-b1a45fa3fffe.graphml b/graph/incidents_graphml/d/de002ff0-fe91-11ec-809e-b1a45fa3fffe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24b7b3efdf9f12beb3206dc8e85f838ed88fe162 --- /dev/null +++ b/graph/incidents_graphml/d/de002ff0-fe91-11ec-809e-b1a45fa3fffe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.16 + USER-0015-1610.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657266298 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de002ff0-fe91-11ec-809e-b1a45fa3fffe + + + diff --git a/graph/incidents_graphml/d/de05d130-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/de05d130-295b-11ee-af70-f9ca9a13f131.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c1532177fcb11a917bd2d52a3ef5f019dc9da04 --- /dev/null +++ b/graph/incidents_graphml/d/de05d130-295b-11ee-af70-f9ca9a13f131.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.35 + 100.64.4.35 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690118503 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de05d130-295b-11ee-af70-f9ca9a13f131 + + + diff --git a/graph/incidents_graphml/d/de19f570-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/de19f570-295b-11ee-af70-f9ca9a13f131.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5261cbfa9c6ba54668cf65f05d151ba79469df6c --- /dev/null +++ b/graph/incidents_graphml/d/de19f570-295b-11ee-af70-f9ca9a13f131.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.35 + 100.64.4.35 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690118504 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de19f570-295b-11ee-af70-f9ca9a13f131 + + + diff --git a/graph/incidents_graphml/d/de1f7c80-1815-11ef-a290-d5e92fd7ebc0.graphml b/graph/incidents_graphml/d/de1f7c80-1815-11ef-a290-d5e92fd7ebc0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78169c48e4536a5e9ece6f62dc666ad755ffe2a8 --- /dev/null +++ b/graph/incidents_graphml/d/de1f7c80-1815-11ef-a290-d5e92fd7ebc0.graphml @@ -0,0 +1,437 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.141 + 100.64.87.141 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.42.148 + 100.64.42.148 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.1 + 100.64.27.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.87.142 + 100.64.87.142 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.143 + 100.64.87.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.5 + 100.64.53.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.41.224 + 100.64.41.224 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.19.41 + 100.64.19.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.18.80 + 100.64.18.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.29.130 + 100.64.29.130 + ["Exploiting Host"] + 0.83125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.30 + 100.64.18.30 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + INCIDENT_LINK + 1716366767 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de1f7c80-1815-11ef-a290-d5e92fd7ebc0 + + + diff --git a/graph/incidents_graphml/d/de223350-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/d/de223350-fc2b-11ed-b0ec-2b4cf5491294.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88045262bf6550f7d5e76b1e0fee4b6c4538f9ad --- /dev/null +++ b/graph/incidents_graphml/d/de223350-fc2b-11ed-b0ec-2b4cf5491294.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.87 + 100.64.35.87 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685150086 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de223350-fc2b-11ed-b0ec-2b4cf5491294 + + + INCIDENT_LINK + 1685150086 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de223350-fc2b-11ed-b0ec-2b4cf5491294 + + + diff --git a/graph/incidents_graphml/d/de2645e0-1166-11ed-8727-e3874c058ed5.graphml b/graph/incidents_graphml/d/de2645e0-1166-11ed-8727-e3874c058ed5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7548c937c28149bb2fdfb99ccc725b022568c1c --- /dev/null +++ b/graph/incidents_graphml/d/de2645e0-1166-11ed-8727-e3874c058ed5.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.28 + USER-0015-1674.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.90 + 100.64.74.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.91 + 100.64.74.91 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.228 + 100.64.70.228 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659336902 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + de2645e0-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336902 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + de2645e0-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336902 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + de2645e0-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336902 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + de2645e0-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336902 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + de2645e0-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336902 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + de2645e0-1166-11ed-8727-e3874c058ed5 + + + diff --git a/graph/incidents_graphml/d/de294d10-7bc0-11ee-bf1f-2f975ac76263.graphml b/graph/incidents_graphml/d/de294d10-7bc0-11ee-bf1f-2f975ac76263.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7eb35e3520da247fa813f38b1057ecdfbc0cf48 --- /dev/null +++ b/graph/incidents_graphml/d/de294d10-7bc0-11ee-bf1f-2f975ac76263.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.161 + 100.64.32.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699177878 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de294d10-7bc0-11ee-bf1f-2f975ac76263 + + + diff --git a/graph/incidents_graphml/d/de33bf00-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/de33bf00-295b-11ee-af70-f9ca9a13f131.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e2056358c492ce78a7abfc5b5d3ece83cb35c39 --- /dev/null +++ b/graph/incidents_graphml/d/de33bf00-295b-11ee-af70-f9ca9a13f131.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.90 + USER-0015-1279.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690118504 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de33bf00-295b-11ee-af70-f9ca9a13f131 + + + diff --git a/graph/incidents_graphml/d/de37c510-eb97-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/d/de37c510-eb97-11ee-8f3a-6b2412cfa52f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..447bb43cf0e7f0c7f91d3bad653e56d54aa344de --- /dev/null +++ b/graph/incidents_graphml/d/de37c510-eb97-11ee-8f3a-6b2412cfa52f.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.25 + 100.64.70.25 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.69.159 + 100.64.69.159 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.59.184 + 100.64.59.184 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711474799 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de37c510-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474799 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de37c510-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474799 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de37c510-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474799 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de37c510-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474799 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de37c510-eb97-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711474799 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de37c510-eb97-11ee-8f3a-6b2412cfa52f + + + diff --git a/graph/incidents_graphml/d/de3b0c00-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/de3b0c00-9027-11ee-bb83-2712b06e9008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca4d89e57e3b91352d1cc534e35674b2ef53c6ca --- /dev/null +++ b/graph/incidents_graphml/d/de3b0c00-9027-11ee-bb83-2712b06e9008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.124 + 100.64.55.124 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701421140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + de3b0c00-9027-11ee-bb83-2712b06e9008 + + + diff --git a/graph/incidents_graphml/d/de40cd40-154c-11ed-a263-3f9dd6de5ee1.graphml b/graph/incidents_graphml/d/de40cd40-154c-11ed-a263-3f9dd6de5ee1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..642f0462a6b34ee20b319d6559d376cbc8f45ae9 --- /dev/null +++ b/graph/incidents_graphml/d/de40cd40-154c-11ed-a263-3f9dd6de5ee1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.187 + USER-0015-1624.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659765540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de40cd40-154c-11ed-a263-3f9dd6de5ee1 + + + diff --git a/graph/incidents_graphml/d/de43a0e0-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/d/de43a0e0-138b-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..909918ac12372c34145f43254ec2ae53f9beb785 --- /dev/null +++ b/graph/incidents_graphml/d/de43a0e0-138b-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.93 + 100.64.60.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687720194 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de43a0e0-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720194 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de43a0e0-138b-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/d/de43d560-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/d/de43d560-a4a5-11ed-b478-67badd244434.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9da2180ba10567bfdd267fea7bd8720e45f63af --- /dev/null +++ b/graph/incidents_graphml/d/de43d560-a4a5-11ed-b478-67badd244434.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.155 + 100.64.82.155 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.55 + 100.64.1.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1675526782 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de43d560-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526782 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de43d560-a4a5-11ed-b478-67badd244434 + + + diff --git a/graph/incidents_graphml/d/de484c90-2ac8-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/d/de484c90-2ac8-11ee-a22a-2dc333e44cac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5579a28d256514aaf2cff2e91aadfe969140a6a --- /dev/null +++ b/graph/incidents_graphml/d/de484c90-2ac8-11ee-a22a-2dc333e44cac.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.181 + 100.64.39.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.86 + 100.64.2.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.151 + 100.64.39.151 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.171 + 100.64.14.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.182 + 100.64.39.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.133 + 100.64.33.133 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.54 + 100.64.39.54 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.183 + 100.64.39.183 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de484c90-2ac8-11ee-a22a-2dc333e44cac + + + diff --git a/graph/incidents_graphml/d/de493cd0-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/de493cd0-9027-11ee-bb83-2712b06e9008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1793adf24f1cba3a6d9203d147610b3a522fe73d --- /dev/null +++ b/graph/incidents_graphml/d/de493cd0-9027-11ee-bb83-2712b06e9008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.126 + 100.64.55.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701421140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de493cd0-9027-11ee-bb83-2712b06e9008 + + + diff --git a/graph/incidents_graphml/d/de4a16f0-a4a5-11ed-b478-67badd244434.graphml b/graph/incidents_graphml/d/de4a16f0-a4a5-11ed-b478-67badd244434.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1ef9baf08c17088f0698c4e190e355a4cf50eb5 --- /dev/null +++ b/graph/incidents_graphml/d/de4a16f0-a4a5-11ed-b478-67badd244434.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.156 + 100.64.82.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.75.181 + 100.64.75.181 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1675526782 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de4a16f0-a4a5-11ed-b478-67badd244434 + + + INCIDENT_LINK + 1675526782 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de4a16f0-a4a5-11ed-b478-67badd244434 + + + diff --git a/graph/incidents_graphml/d/de4cc540-295b-11ee-af70-f9ca9a13f131.graphml b/graph/incidents_graphml/d/de4cc540-295b-11ee-af70-f9ca9a13f131.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67dcf59a2dd4ac0ca095c8b62ad7c29a2dbd7b12 --- /dev/null +++ b/graph/incidents_graphml/d/de4cc540-295b-11ee-af70-f9ca9a13f131.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.90 + USER-0015-1279.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690118504 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de4cc540-295b-11ee-af70-f9ca9a13f131 + + + diff --git a/graph/incidents_graphml/d/de56f870-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/de56f870-9027-11ee-bb83-2712b06e9008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a72a781b805f915b5013e98af0a67ac63069469 --- /dev/null +++ b/graph/incidents_graphml/d/de56f870-9027-11ee-bb83-2712b06e9008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.126 + 100.64.55.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701421140 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + de56f870-9027-11ee-bb83-2712b06e9008 + + + diff --git a/graph/incidents_graphml/d/de5b3850-2ac8-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/d/de5b3850-2ac8-11ee-a22a-2dc333e44cac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6829bda4c8849d2edfe51d4ece24dbea92d009e4 --- /dev/null +++ b/graph/incidents_graphml/d/de5b3850-2ac8-11ee-a22a-2dc333e44cac.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.204 + 100.64.2.204 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.187 + 100.64.39.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.188 + 100.64.39.188 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690275270 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de5b3850-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de5b3850-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de5b3850-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de5b3850-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de5b3850-2ac8-11ee-a22a-2dc333e44cac + + + INCIDENT_LINK + 1690275270 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de5b3850-2ac8-11ee-a22a-2dc333e44cac + + + diff --git a/graph/incidents_graphml/d/de5fb180-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/d/de5fb180-fc2b-11ed-b0ec-2b4cf5491294.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd7e4d0cfa045bd41fc3d37812e099272e5fca50 --- /dev/null +++ b/graph/incidents_graphml/d/de5fb180-fc2b-11ed-b0ec-2b4cf5491294.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.35.87 + 100.64.35.87 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685150086 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + de5fb180-fc2b-11ed-b0ec-2b4cf5491294 + + + diff --git a/graph/incidents_graphml/d/de6104c0-9f34-11ee-ab4f-6ff6fea5e350.graphml b/graph/incidents_graphml/d/de6104c0-9f34-11ee-ab4f-6ff6fea5e350.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68c291b8300a970f629c62d1ac02f303757ee4d9 --- /dev/null +++ b/graph/incidents_graphml/d/de6104c0-9f34-11ee-ab4f-6ff6fea5e350.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.138 + 100.64.49.138 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.213 + 100.64.18.213 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.139 + 100.64.49.139 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.120 + 100.64.8.120 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703075991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de6104c0-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de6104c0-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de6104c0-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de6104c0-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de6104c0-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de6104c0-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de6104c0-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de6104c0-9f34-11ee-ab4f-6ff6fea5e350 + + + diff --git a/graph/incidents_graphml/d/de62e120-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/de62e120-57c5-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac35eb2e432cd91d0313e79917790738b894ac3d --- /dev/null +++ b/graph/incidents_graphml/d/de62e120-57c5-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,151 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.114 + USER-0015-1204.example.internal + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695221784 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de62e120-57c5-11ee-8f21-8ba3e02675af + + + INCIDENT_LINK + 1695221784 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de62e120-57c5-11ee-8f21-8ba3e02675af + + + INCIDENT_LINK + 1695221784 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de62e120-57c5-11ee-8f21-8ba3e02675af + + + INCIDENT_LINK + 1695221784 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de62e120-57c5-11ee-8f21-8ba3e02675af + + + INCIDENT_LINK + 1695221784 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de62e120-57c5-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/d/de6580c0-138b-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/d/de6580c0-138b-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bae5105c2a2a14e746d1af9e12ce18b0e58df624 --- /dev/null +++ b/graph/incidents_graphml/d/de6580c0-138b-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.2 + 100.64.69.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.15 + 100.64.74.15 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687720194 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de6580c0-138b-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687720194 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de6580c0-138b-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/d/de674090-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/d/de674090-3312-11ed-a5b7-31dcf2c00f36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e2b6ee042ba64decf92619719e4e78246787647 --- /dev/null +++ b/graph/incidents_graphml/d/de674090-3312-11ed-a5b7-31dcf2c00f36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.20.115 + 100.64.20.115 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663039165 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de674090-3312-11ed-a5b7-31dcf2c00f36 + + + diff --git a/graph/incidents_graphml/d/de6a5790-0c8c-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/d/de6a5790-0c8c-11ee-af4a-2171e1d29da4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d6b49c0403560548272df51436c3c654281d1a7 --- /dev/null +++ b/graph/incidents_graphml/d/de6a5790-0c8c-11ee-af4a-2171e1d29da4.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.52 + USER-0015-1514.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.11.177 + 100.64.11.177 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.53 + 100.64.69.53 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.29.19 + 100.64.29.19 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6a5790-0c8c-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6a5790-0c8c-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6a5790-0c8c-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6a5790-0c8c-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6a5790-0c8c-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6a5790-0c8c-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6a5790-0c8c-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6a5790-0c8c-11ee-af4a-2171e1d29da4 + + + diff --git a/graph/incidents_graphml/d/de6cefa0-0c8c-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/d/de6cefa0-0c8c-11ee-af4a-2171e1d29da4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9cf2d06f0567408e7019077a31511b94631908d6 --- /dev/null +++ b/graph/incidents_graphml/d/de6cefa0-0c8c-11ee-af4a-2171e1d29da4.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.2 + 100.64.18.2 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.25.3 + 100.64.25.3 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.7.75 + 100.64.7.75 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6cefa0-0c8c-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6cefa0-0c8c-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6cefa0-0c8c-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6cefa0-0c8c-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6cefa0-0c8c-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686950966 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6cefa0-0c8c-11ee-af4a-2171e1d29da4 + + + diff --git a/graph/incidents_graphml/d/de6d55a0-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/d/de6d55a0-5b2c-11ee-a5b1-e563b721d2c6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d09cf63eb0411d153159b9266c2e03a82cc62d57 --- /dev/null +++ b/graph/incidents_graphml/d/de6d55a0-5b2c-11ee-a5b1-e563b721d2c6.graphml @@ -0,0 +1,169 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.173 + 100.64.68.173 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + HOST + 100.64.62.44 + 100.64.62.44 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.7.155 + 100.64.7.155 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + de6d55a0-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + de6d55a0-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + de6d55a0-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + de6d55a0-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + de6d55a0-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + de6d55a0-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + de6d55a0-5b2c-11ee-a5b1-e563b721d2c6 + + + diff --git a/graph/incidents_graphml/d/de6e4000-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/d/de6e4000-5b2c-11ee-a5b1-e563b721d2c6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0f105a4b78d278169b18024297a33467bf6dbfd --- /dev/null +++ b/graph/incidents_graphml/d/de6e4000-5b2c-11ee-a5b1-e563b721d2c6.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.33 + 100.64.11.33 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.174 + 100.64.68.174 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6e4000-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6e4000-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6e4000-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6e4000-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6e4000-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595876 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de6e4000-5b2c-11ee-a5b1-e563b721d2c6 + + + diff --git a/graph/incidents_graphml/d/de798340-fe69-11ed-a136-877286d930e4.graphml b/graph/incidents_graphml/d/de798340-fe69-11ed-a136-877286d930e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e22c36ecbbace4e7447abc3cfff72e5b543d4c6b --- /dev/null +++ b/graph/incidents_graphml/d/de798340-fe69-11ed-a136-877286d930e4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.7.107 + 100.64.7.107 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685396617 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de798340-fe69-11ed-a136-877286d930e4 + + + INCIDENT_LINK + 1685396617 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + de798340-fe69-11ed-a136-877286d930e4 + + + diff --git a/graph/incidents_graphml/d/de7a3d00-9562-11ed-94b8-8539433cb390.graphml b/graph/incidents_graphml/d/de7a3d00-9562-11ed-94b8-8539433cb390.graphml new file mode 100644 index 0000000000000000000000000000000000000000..590d17c23b8102311ddf5da616f34c05ded2a719 --- /dev/null +++ b/graph/incidents_graphml/d/de7a3d00-9562-11ed-94b8-8539433cb390.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.170 + 100.64.78.170 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.211 + 100.64.72.211 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1673848739 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de7a3d00-9562-11ed-94b8-8539433cb390 + + + INCIDENT_LINK + 1673848739 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de7a3d00-9562-11ed-94b8-8539433cb390 + + + diff --git a/graph/incidents_graphml/d/de8d9240-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/de8d9240-57d3-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2fe0cd30b897bdabeb1439ddfcbb799c641068ba --- /dev/null +++ b/graph/incidents_graphml/d/de8d9240-57d3-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,409 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.61.23 + 100.64.61.23 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.24 + 100.64.61.24 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.29 + 100.64.15.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.25 + 100.64.61.25 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.69 + 100.64.44.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.194 + 100.64.25.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.244 + 100.64.3.244 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.26 + 100.64.61.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.227 + 100.64.23.227 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de8d9240-57d3-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/d/de9a8920-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/d/de9a8920-3683-11ef-865b-773bd844d05a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29b2094500068cd3f49c63fadf43cae15d52f132 --- /dev/null +++ b/graph/incidents_graphml/d/de9a8920-3683-11ef-865b-773bd844d05a.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.189 + 100.64.21.189 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.190 + 100.64.21.190 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.191 + 100.64.21.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.192 + 100.64.21.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.193 + 100.64.21.193 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de9a8920-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de9a8920-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de9a8920-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de9a8920-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de9a8920-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de9a8920-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de9a8920-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de9a8920-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de9a8920-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + de9a8920-3683-11ef-865b-773bd844d05a + + + diff --git a/graph/incidents_graphml/d/de9aba00-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/de9aba00-57c5-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..379a9114a62331bda7a3d741034e08ec8e06b255 --- /dev/null +++ b/graph/incidents_graphml/d/de9aba00-57c5-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.174 + 100.64.13.174 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695221785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + de9aba00-57c5-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/d/dea5fad0-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/d/dea5fad0-3683-11ef-865b-773bd844d05a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ffeae4de4a570bc1585ff05b8514b9ba0e13ef1 --- /dev/null +++ b/graph/incidents_graphml/d/dea5fad0-3683-11ef-865b-773bd844d05a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.198 + 100.64.21.198 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.199 + 100.64.21.199 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719712547 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dea5fad0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dea5fad0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dea5fad0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dea5fad0-3683-11ef-865b-773bd844d05a + + + diff --git a/graph/incidents_graphml/d/dea93da0-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/dea93da0-3452-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43a04ced9e60d309b31bc66bf290f20bfde51209 --- /dev/null +++ b/graph/incidents_graphml/d/dea93da0-3452-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.19 + 100.64.62.19 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691324102 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dea93da0-3452-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/deaa96f0-74ad-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/deaa96f0-74ad-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b35601605d0e39c423ccd2373fa2f09010690726 --- /dev/null +++ b/graph/incidents_graphml/d/deaa96f0-74ad-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.185 + 100.64.67.185 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698400060 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + deaa96f0-74ad-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/d/deb19390-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/d/deb19390-3683-11ef-865b-773bd844d05a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..667b8353e01f3d69f594d47cfca07df19591f3b1 --- /dev/null +++ b/graph/incidents_graphml/d/deb19390-3683-11ef-865b-773bd844d05a.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.202 + 100.64.21.202 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.203 + 100.64.21.203 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.204 + 100.64.21.204 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + deb19390-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + deb19390-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + deb19390-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + deb19390-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + deb19390-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712547 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + deb19390-3683-11ef-865b-773bd844d05a + + + diff --git a/graph/incidents_graphml/d/debc6b30-9f34-11ee-ab4f-6ff6fea5e350.graphml b/graph/incidents_graphml/d/debc6b30-9f34-11ee-ab4f-6ff6fea5e350.graphml new file mode 100644 index 0000000000000000000000000000000000000000..736f9211ed010f7b3b278f8306f1ee15b470fdee --- /dev/null +++ b/graph/incidents_graphml/d/debc6b30-9f34-11ee-ab4f-6ff6fea5e350.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.142 + 100.64.49.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703075991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + debc6b30-9f34-11ee-ab4f-6ff6fea5e350 + + + diff --git a/graph/incidents_graphml/d/dec02100-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/dec02100-3452-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7dc183930e55c5afc2e1d995503d0592f1567048 --- /dev/null +++ b/graph/incidents_graphml/d/dec02100-3452-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.19 + 100.64.62.19 + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691324102 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dec02100-3452-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/decac310-9f34-11ee-ab4f-6ff6fea5e350.graphml b/graph/incidents_graphml/d/decac310-9f34-11ee-ab4f-6ff6fea5e350.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e3dc86d5b560f4beac954ece708562795bab0f7 --- /dev/null +++ b/graph/incidents_graphml/d/decac310-9f34-11ee-ab4f-6ff6fea5e350.graphml @@ -0,0 +1,561 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.144 + 100.64.49.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.145 + 100.64.49.145 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.204 + 100.64.20.204 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.102 + 100.64.20.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.134 + 100.64.33.134 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.146 + 100.64.49.146 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.147 + 100.64.49.147 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.148 + 100.64.49.148 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.252 + 100.64.7.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.149 + 100.64.49.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + decac310-9f34-11ee-ab4f-6ff6fea5e350 + + + diff --git a/graph/incidents_graphml/d/ded602a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml b/graph/incidents_graphml/d/ded602a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44a8bba47a42f96dcaac10386912b04406fb3d3a --- /dev/null +++ b/graph/incidents_graphml/d/ded602a0-ce7b-11ed-9e5b-155bf57fc5c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.162 + 100.64.71.162 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1680126693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + ded602a0-ce7b-11ed-9e5b-155bf57fc5c4 + + + diff --git a/graph/incidents_graphml/d/ded80980-9f34-11ee-ab4f-6ff6fea5e350.graphml b/graph/incidents_graphml/d/ded80980-9f34-11ee-ab4f-6ff6fea5e350.graphml new file mode 100644 index 0000000000000000000000000000000000000000..502c7d8efd61b8ed3cc17e17f6e0e6acd1fa2f5e --- /dev/null +++ b/graph/incidents_graphml/d/ded80980-9f34-11ee-ab4f-6ff6fea5e350.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.144 + 100.64.49.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703075992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + ded80980-9f34-11ee-ab4f-6ff6fea5e350 + + + diff --git a/graph/incidents_graphml/d/ded82d80-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/ded82d80-71b6-11ee-b078-c3c891418ab6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f61a41d66ac15fcf3866b91daf1faedfab10a205 --- /dev/null +++ b/graph/incidents_graphml/d/ded82d80-71b6-11ee-b078-c3c891418ab6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.102 + 100.64.17.102 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698074073 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + ded82d80-71b6-11ee-b078-c3c891418ab6 + + + diff --git a/graph/incidents_graphml/d/dedba7f0-ce7b-11ed-9e5b-155bf57fc5c4.graphml b/graph/incidents_graphml/d/dedba7f0-ce7b-11ed-9e5b-155bf57fc5c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55e4b7dd40e76ad73ccf473b7ceb076edf12f49a --- /dev/null +++ b/graph/incidents_graphml/d/dedba7f0-ce7b-11ed-9e5b-155bf57fc5c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.71.162 + 100.64.71.162 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1680126693 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dedba7f0-ce7b-11ed-9e5b-155bf57fc5c4 + + + diff --git a/graph/incidents_graphml/d/dee61030-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/dee61030-71b6-11ee-b078-c3c891418ab6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3742b3c6cdfb94fe56a1c4cbd140ac41eae2c825 --- /dev/null +++ b/graph/incidents_graphml/d/dee61030-71b6-11ee-b078-c3c891418ab6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.150 + 100.64.9.150 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698074073 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dee61030-71b6-11ee-b078-c3c891418ab6 + + + diff --git a/graph/incidents_graphml/d/dee87930-ce7b-11ed-9e5b-155bf57fc5c4.graphml b/graph/incidents_graphml/d/dee87930-ce7b-11ed-9e5b-155bf57fc5c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..875612c297b8a10a1cc2ed4808f4cb8093487e7d --- /dev/null +++ b/graph/incidents_graphml/d/dee87930-ce7b-11ed-9e5b-155bf57fc5c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.190 + 100.64.75.190 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1680126693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dee87930-ce7b-11ed-9e5b-155bf57fc5c4 + + + diff --git a/graph/incidents_graphml/d/dee9c460-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/dee9c460-57c5-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..222e220f3b3e314020aa179ec15a54d146f27cf4 --- /dev/null +++ b/graph/incidents_graphml/d/dee9c460-57c5-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.16 + 100.64.14.16 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695221785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dee9c460-57c5-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/d/deeaacf0-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/deeaacf0-9027-11ee-bb83-2712b06e9008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37d8cc4b467410d601e6552787049c2cff6a798f --- /dev/null +++ b/graph/incidents_graphml/d/deeaacf0-9027-11ee-bb83-2712b06e9008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.128 + 100.64.55.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701421141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + deeaacf0-9027-11ee-bb83-2712b06e9008 + + + diff --git a/graph/incidents_graphml/d/deedd060-ce7b-11ed-9e5b-155bf57fc5c4.graphml b/graph/incidents_graphml/d/deedd060-ce7b-11ed-9e5b-155bf57fc5c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b6f136a5533743657708320544dda3116b3c723 --- /dev/null +++ b/graph/incidents_graphml/d/deedd060-ce7b-11ed-9e5b-155bf57fc5c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.75.190 + 100.64.75.190 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1680126693 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + deedd060-ce7b-11ed-9e5b-155bf57fc5c4 + + + diff --git a/graph/incidents_graphml/d/def7f360-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/def7f360-9027-11ee-bb83-2712b06e9008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..73c83be40669c0d0b4d5784d253560ff83c0dd43 --- /dev/null +++ b/graph/incidents_graphml/d/def7f360-9027-11ee-bb83-2712b06e9008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.128 + 100.64.55.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701421141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + def7f360-9027-11ee-bb83-2712b06e9008 + + + diff --git a/graph/incidents_graphml/d/defa1810-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/defa1810-57c5-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69940b03aad72cb47cb0a920d2f6addbf4ae3492 --- /dev/null +++ b/graph/incidents_graphml/d/defa1810-57c5-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.16 + 100.64.14.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695221785 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + defa1810-57c5-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/d/df0252b0-9e14-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/d/df0252b0-9e14-11ee-a5ab-8550688be6fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c633a5b4c11e72bb4a006079007710849cc26d38 --- /dev/null +++ b/graph/incidents_graphml/d/df0252b0-9e14-11ee-a5ab-8550688be6fd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.144 + 100.64.10.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1702952297 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df0252b0-9e14-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952297 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df0252b0-9e14-11ee-a5ab-8550688be6fd + + + diff --git a/graph/incidents_graphml/d/df02e3c0-0010-11ef-83c1-e54678fd0000.graphml b/graph/incidents_graphml/d/df02e3c0-0010-11ef-83c1-e54678fd0000.graphml new file mode 100644 index 0000000000000000000000000000000000000000..117c56915eee9d0c442bbd3b85f18a9ba3ef3e42 --- /dev/null +++ b/graph/incidents_graphml/d/df02e3c0-0010-11ef-83c1-e54678fd0000.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.171 + 100.64.69.171 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Okta","PAN NGFW"] + + + INCIDENT_LINK + 1713725793 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df02e3c0-0010-11ef-83c1-e54678fd0000 + + + diff --git a/graph/incidents_graphml/d/df044f70-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/df044f70-9027-11ee-bb83-2712b06e9008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6811d71c5debe4b5bc000529bbc6d9b7ca6ef36f --- /dev/null +++ b/graph/incidents_graphml/d/df044f70-9027-11ee-bb83-2712b06e9008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.23 + 100.64.8.23 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701421141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df044f70-9027-11ee-bb83-2712b06e9008 + + + diff --git a/graph/incidents_graphml/d/df0531d0-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/d/df0531d0-3683-11ef-865b-773bd844d05a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8ca3dc63add0b64556771b83a0eb1155b17c234 --- /dev/null +++ b/graph/incidents_graphml/d/df0531d0-3683-11ef-865b-773bd844d05a.graphml @@ -0,0 +1,581 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.208 + 100.64.21.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.209 + 100.64.21.209 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.210 + 100.64.21.210 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.211 + 100.64.21.211 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.212 + 100.64.21.212 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.128 + 100.64.3.128 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.213 + 100.64.21.213 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.214 + 100.64.21.214 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.215 + 100.64.21.215 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.216 + 100.64.21.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.71 + 100.64.7.71 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.217 + 100.64.21.217 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712548 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df0531d0-3683-11ef-865b-773bd844d05a + + + diff --git a/graph/incidents_graphml/d/df0c77e0-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/d/df0c77e0-274f-11ee-9ae4-f7600c9ae4b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20843047c0c904e11d983ff12788a997e93aca54 --- /dev/null +++ b/graph/incidents_graphml/d/df0c77e0-274f-11ee-9ae4-f7600c9ae4b6.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.79 + 100.64.63.79 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.71 + 100.64.31.71 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.9 + 100.64.3.9 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.100 + 100.64.50.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.35 + 100.64.52.35 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689893449 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df0c77e0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893449 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df0c77e0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893449 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df0c77e0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893449 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df0c77e0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893449 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df0c77e0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893449 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df0c77e0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893449 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df0c77e0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893449 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df0c77e0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893449 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df0c77e0-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893449 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df0c77e0-274f-11ee-9ae4-f7600c9ae4b6 + + + diff --git a/graph/incidents_graphml/d/df116ed0-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/df116ed0-9027-11ee-bb83-2712b06e9008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5feaebfbd3f7fedf028b3b219adc4c412d76a0a2 --- /dev/null +++ b/graph/incidents_graphml/d/df116ed0-9027-11ee-bb83-2712b06e9008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.23 + 100.64.8.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701421141 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df116ed0-9027-11ee-bb83-2712b06e9008 + + + diff --git a/graph/incidents_graphml/d/df16bf70-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/df16bf70-57d3-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e7113643f07ed7b5f5840b15b5d8ebcdab9cdef --- /dev/null +++ b/graph/incidents_graphml/d/df16bf70-57d3-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,151 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.31 + 100.64.61.31 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.32 + 100.64.61.32 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.61 + 100.64.12.61 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.61.33 + 100.64.61.33 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695227798 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + df16bf70-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227798 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + df16bf70-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227798 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + df16bf70-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227798 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + df16bf70-57d3-11ee-9e4b-6beca2c0696d + + + INCIDENT_LINK + 1695227798 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + df16bf70-57d3-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/d/df1bc0b0-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/d/df1bc0b0-13f4-11ee-9bb8-6b8312f57fd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5214ba0bf79fe970b2392ccf8d868ae652eb5388 --- /dev/null +++ b/graph/incidents_graphml/d/df1bc0b0-13f4-11ee-9bb8-6b8312f57fd1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.170.40 + 192.168.170.40 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.228 + 100.64.72.228 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687765293 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df1bc0b0-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765293 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df1bc0b0-13f4-11ee-9bb8-6b8312f57fd1 + + + diff --git a/graph/incidents_graphml/d/df1ca530-ff7f-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/d/df1ca530-ff7f-11ee-b9e5-11c35e54feda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d25c86c08e8c0eb9bf8d9bf0f6e86a81fefb994d --- /dev/null +++ b/graph/incidents_graphml/d/df1ca530-ff7f-11ee-b9e5-11c35e54feda.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.247 + 100.64.47.247 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.69.229 + 100.64.69.229 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713663516 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df1ca530-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663516 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df1ca530-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663516 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df1ca530-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663516 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df1ca530-ff7f-11ee-b9e5-11c35e54feda + + + diff --git a/graph/incidents_graphml/d/df2210a0-9027-11ee-bb83-2712b06e9008.graphml b/graph/incidents_graphml/d/df2210a0-9027-11ee-bb83-2712b06e9008.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76b69549aea076eb194ebc69ba9eb421f41867c0 --- /dev/null +++ b/graph/incidents_graphml/d/df2210a0-9027-11ee-bb83-2712b06e9008.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.168 + 100.64.42.168 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701421141 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + df2210a0-9027-11ee-bb83-2712b06e9008 + + + diff --git a/graph/incidents_graphml/d/df2586d0-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/d/df2586d0-766f-11ee-81bc-199b4060a9b4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d0971facf2ff003da37c28036fac64bef20c3fc --- /dev/null +++ b/graph/incidents_graphml/d/df2586d0-766f-11ee-81bc-199b4060a9b4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.164 + 100.64.22.164 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698593335 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df2586d0-766f-11ee-81bc-199b4060a9b4 + + + diff --git a/graph/incidents_graphml/d/df30f0d0-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/d/df30f0d0-f135-11ec-9654-cb9d1f320859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a07d285cc99fcbcde9ed5bf4abce52e1cbe5f4f0 --- /dev/null +++ b/graph/incidents_graphml/d/df30f0d0-f135-11ec-9654-cb9d1f320859.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.75.41 + USER-0015-1707.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655797422 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + df30f0d0-f135-11ec-9654-cb9d1f320859 + + + diff --git a/graph/incidents_graphml/d/df331b60-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/d/df331b60-766f-11ee-81bc-199b4060a9b4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a23f49e8219dc222ecb74cab7f344d44f54ef377 --- /dev/null +++ b/graph/incidents_graphml/d/df331b60-766f-11ee-81bc-199b4060a9b4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.130 + 100.64.24.130 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698593335 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df331b60-766f-11ee-81bc-199b4060a9b4 + + + diff --git a/graph/incidents_graphml/d/df3e1b40-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/df3e1b40-71b6-11ee-b078-c3c891418ab6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3848aa267b682b1b64933050950d3aef2c7b7eb3 --- /dev/null +++ b/graph/incidents_graphml/d/df3e1b40-71b6-11ee-b078-c3c891418ab6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.89 + 100.64.37.89 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698074073 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + df3e1b40-71b6-11ee-b078-c3c891418ab6 + + + diff --git a/graph/incidents_graphml/d/df41c160-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/d/df41c160-766f-11ee-81bc-199b4060a9b4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba90315245a2355c79b36c0639a209e96f24020c --- /dev/null +++ b/graph/incidents_graphml/d/df41c160-766f-11ee-81bc-199b4060a9b4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.130 + 100.64.24.130 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698593335 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df41c160-766f-11ee-81bc-199b4060a9b4 + + + diff --git a/graph/incidents_graphml/d/df41cf70-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/df41cf70-57c5-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..731d1a5dd16375fd851f0afcbc6bf2a134e86256 --- /dev/null +++ b/graph/incidents_graphml/d/df41cf70-57c5-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695221786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df41cf70-57c5-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/d/df47acd0-ff7f-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/d/df47acd0-ff7f-11ee-b9e5-11c35e54feda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd26acb72781fc59a9a3caf4ede14d4bea39d1c9 --- /dev/null +++ b/graph/incidents_graphml/d/df47acd0-ff7f-11ee-b9e5-11c35e54feda.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.154 + 100.64.24.154 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"] + + + INCIDENT_LINK + 1713663516 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df47acd0-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663516 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df47acd0-ff7f-11ee-b9e5-11c35e54feda + + + diff --git a/graph/incidents_graphml/d/df48a2f0-39d9-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/d/df48a2f0-39d9-11ee-b92b-37d2cd449a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2618e62a904c76d85c06a6047783e3938f8afcb --- /dev/null +++ b/graph/incidents_graphml/d/df48a2f0-39d9-11ee-b92b-37d2cd449a32.graphml @@ -0,0 +1,445 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.210 + 100.64.54.210 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.211 + 100.64.54.211 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.31 + 100.64.15.31 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.212 + 100.64.54.212 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.213 + 100.64.54.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.214 + 100.64.54.214 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.147 + 100.64.24.147 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.108 + 100.64.24.108 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931841 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df48a2f0-39d9-11ee-b92b-37d2cd449a32 + + + diff --git a/graph/incidents_graphml/d/df4df9c0-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/df4df9c0-71b6-11ee-b078-c3c891418ab6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1fe5d5893ce4eae82d95f5482793136964ceba3 --- /dev/null +++ b/graph/incidents_graphml/d/df4df9c0-71b6-11ee-b078-c3c891418ab6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.89 + 100.64.37.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698074074 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df4df9c0-71b6-11ee-b078-c3c891418ab6 + + + diff --git a/graph/incidents_graphml/d/df529850-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/df529850-57c5-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a7a966c7fcd171e1239b8f9edd1ac143175eb78 --- /dev/null +++ b/graph/incidents_graphml/d/df529850-57c5-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695221786 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df529850-57c5-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/d/df549120-3d0b-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/d/df549120-3d0b-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f3eeac49a7f76acf379e34e0532579ebbc6352c --- /dev/null +++ b/graph/incidents_graphml/d/df549120-3d0b-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.240 + 100.64.59.240 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692283169 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df549120-3d0b-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/d/df5bdc70-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/df5bdc70-71b6-11ee-b078-c3c891418ab6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c3f1a8ef24d056707401b003e450a7ed0700a2e7 --- /dev/null +++ b/graph/incidents_graphml/d/df5bdc70-71b6-11ee-b078-c3c891418ab6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.32 + 100.64.53.32 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698074074 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df5bdc70-71b6-11ee-b078-c3c891418ab6 + + + diff --git a/graph/incidents_graphml/d/df5d4b60-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/df5d4b60-3452-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b999401cefafd2de27bfd4d4bd08b4af19fcfc44 --- /dev/null +++ b/graph/incidents_graphml/d/df5d4b60-3452-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.38 + 100.64.64.38 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691324103 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df5d4b60-3452-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/df5f4280-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/df5f4280-57c5-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f86c98648a47c08e72490c09456a63ccf2bec9b --- /dev/null +++ b/graph/incidents_graphml/d/df5f4280-57c5-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,195 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.20 + 100.64.14.20 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695221786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df5f4280-57c5-11ee-8f21-8ba3e02675af + + + INCIDENT_LINK + 1695221786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df5f4280-57c5-11ee-8f21-8ba3e02675af + + + INCIDENT_LINK + 1695221786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df5f4280-57c5-11ee-8f21-8ba3e02675af + + + INCIDENT_LINK + 1695221786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df5f4280-57c5-11ee-8f21-8ba3e02675af + + + INCIDENT_LINK + 1695221786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df5f4280-57c5-11ee-8f21-8ba3e02675af + + + INCIDENT_LINK + 1695221786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df5f4280-57c5-11ee-8f21-8ba3e02675af + + + INCIDENT_LINK + 1695221786 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df5f4280-57c5-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/d/df632460-f135-11ec-9654-cb9d1f320859.graphml b/graph/incidents_graphml/d/df632460-f135-11ec-9654-cb9d1f320859.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f50aff94e409e9c078ed20d9c3f64f19621622dc --- /dev/null +++ b/graph/incidents_graphml/d/df632460-f135-11ec-9654-cb9d1f320859.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.43 + 100.64.75.43 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.40 + USER-0015-1612.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655797422 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df632460-f135-11ec-9654-cb9d1f320859 + + + INCIDENT_LINK + 1655797422 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df632460-f135-11ec-9654-cb9d1f320859 + + + diff --git a/graph/incidents_graphml/d/df68fbd0-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/df68fbd0-71b6-11ee-b078-c3c891418ab6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9dc1ec7271f8b5d9059885f78b4fa60fb5ecaa28 --- /dev/null +++ b/graph/incidents_graphml/d/df68fbd0-71b6-11ee-b078-c3c891418ab6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.32 + 100.64.53.32 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698074074 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df68fbd0-71b6-11ee-b078-c3c891418ab6 + + + diff --git a/graph/incidents_graphml/d/df6d7c20-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/d/df6d7c20-54cc-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f05aa054a7f1e27e9e13eb7af534bb398791b85 --- /dev/null +++ b/graph/incidents_graphml/d/df6d7c20-54cc-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.77 + 100.64.27.77 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694894939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df6d7c20-54cc-11ee-acde-a35f456e55de + + + INCIDENT_LINK + 1694894939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df6d7c20-54cc-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/d/df6d9a60-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/df6d9a60-57c5-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1f28f6e23fc69edd83f90db2a8c4b9d64f45b82 --- /dev/null +++ b/graph/incidents_graphml/d/df6d9a60-57c5-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.20 + 100.64.14.20 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695221786 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df6d9a60-57c5-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/d/df6e2800-675a-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/d/df6e2800-675a-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9234e5569da4ea76bd3407a2396944aed445632f --- /dev/null +++ b/graph/incidents_graphml/d/df6e2800-675a-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.29 + 100.64.12.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696935048 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df6e2800-675a-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/d/df74e420-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/d/df74e420-2f46-11ee-8421-f3eff1a35bff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae63d7748857a34df0e1e8a2b8ab8fd0eb698dec --- /dev/null +++ b/graph/incidents_graphml/d/df74e420-2f46-11ee-8421-f3eff1a35bff.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.129 + 100.64.76.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.114 + 100.64.71.114 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.130 + 100.64.76.130 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690769193 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df74e420-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769193 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df74e420-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769193 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df74e420-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769193 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df74e420-2f46-11ee-8421-f3eff1a35bff + + + diff --git a/graph/incidents_graphml/d/df7c2220-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/d/df7c2220-54cc-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8dcd418567dd3286bf023d6b547e137d612a4fa4 --- /dev/null +++ b/graph/incidents_graphml/d/df7c2220-54cc-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.77 + 100.64.27.77 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694894939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + df7c2220-54cc-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/d/df7d1c20-675a-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/d/df7d1c20-675a-11ee-acda-6b17f6d60989.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6050f729a1b3e64e6edeb9caca3206ee724a5c3 --- /dev/null +++ b/graph/incidents_graphml/d/df7d1c20-675a-11ee-acda-6b17f6d60989.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.29 + 100.64.12.29 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696935049 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df7d1c20-675a-11ee-acda-6b17f6d60989 + + + diff --git a/graph/incidents_graphml/d/df7e6340-57c5-11ee-8f21-8ba3e02675af.graphml b/graph/incidents_graphml/d/df7e6340-57c5-11ee-8f21-8ba3e02675af.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80fdad781b14d750fd3aef6dd54722c3e341994b --- /dev/null +++ b/graph/incidents_graphml/d/df7e6340-57c5-11ee-8f21-8ba3e02675af.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.22 + 100.64.14.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695221786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df7e6340-57c5-11ee-8f21-8ba3e02675af + + + diff --git a/graph/incidents_graphml/d/df821170-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/df821170-3452-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4232c4e41fb5fd475323e39323b6e7d8c3d9f199 --- /dev/null +++ b/graph/incidents_graphml/d/df821170-3452-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.38 + 100.64.64.38 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691324103 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + df821170-3452-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/df87ee70-1601-11ee-b5b0-23eb7b8b596d.graphml b/graph/incidents_graphml/d/df87ee70-1601-11ee-b5b0-23eb7b8b596d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60b97515b9a2684d5d0261ae12ffa3acb6b1334e --- /dev/null +++ b/graph/incidents_graphml/d/df87ee70-1601-11ee-b5b0-23eb7b8b596d.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.183 + 100.64.47.183 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.161 + 100.64.59.161 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.171 + 100.64.14.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.171 + 100.64.30.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.162 + 100.64.59.162 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687990779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df87ee70-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df87ee70-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df87ee70-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df87ee70-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df87ee70-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df87ee70-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df87ee70-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df87ee70-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df87ee70-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990779 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + df87ee70-1601-11ee-b5b0-23eb7b8b596d + + + diff --git a/graph/incidents_graphml/d/df893050-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/df893050-57d3-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af20add711628a248e22890aa33bddcd81368d3b --- /dev/null +++ b/graph/incidents_graphml/d/df893050-57d3-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695227799 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df893050-57d3-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/d/df9b0aa0-57d3-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/d/df9b0aa0-57d3-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4f922d12d9c5753887ac57baa1c29a95b4652ef --- /dev/null +++ b/graph/incidents_graphml/d/df9b0aa0-57d3-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.203 + 100.64.23.203 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695227799 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + df9b0aa0-57d3-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/d/dfa2e400-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/d/dfa2e400-54cc-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5355f67cbfbd3fe29680611dd09cf8ba42bb513 --- /dev/null +++ b/graph/incidents_graphml/d/dfa2e400-54cc-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.120 + 100.64.30.120 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694894939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfa2e400-54cc-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/d/dfabe090-3452-11ee-9106-1db75c7cc651.graphml b/graph/incidents_graphml/d/dfabe090-3452-11ee-9106-1db75c7cc651.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54e9227e89d9de6ed3d1c38c197cf42610a3ed15 --- /dev/null +++ b/graph/incidents_graphml/d/dfabe090-3452-11ee-9106-1db75c7cc651.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.40 + 100.64.64.40 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691324104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfabe090-3452-11ee-9106-1db75c7cc651 + + + diff --git a/graph/incidents_graphml/d/dfb1b110-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/d/dfb1b110-54cc-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55d88237ec8e5a61ea6a4418e6f45a2b9210c5d4 --- /dev/null +++ b/graph/incidents_graphml/d/dfb1b110-54cc-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.120 + 100.64.30.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694894939 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dfb1b110-54cc-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/d/dfb93280-b136-11ed-8c7d-65e7f37a4d8d.graphml b/graph/incidents_graphml/d/dfb93280-b136-11ed-8c7d-65e7f37a4d8d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..424d58715aaf8241b9361a179cc7a8d461a499c1 --- /dev/null +++ b/graph/incidents_graphml/d/dfb93280-b136-11ed-8c7d-65e7f37a4d8d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.239 + 100.64.83.239 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.75.193.220 + 10.75.193.220 + ["Exploiting Target"] + 0.25 + ["Precinct","Trend Deep Security","AWS VPC Security"] + + + INCIDENT_LINK + 1676908475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfb93280-b136-11ed-8c7d-65e7f37a4d8d + + + INCIDENT_LINK + 1676908475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfb93280-b136-11ed-8c7d-65e7f37a4d8d + + + diff --git a/graph/incidents_graphml/d/dfbf3300-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/d/dfbf3300-3683-11ef-865b-773bd844d05a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f97f4302f320373cd340737b4070a3026adc5297 --- /dev/null +++ b/graph/incidents_graphml/d/dfbf3300-3683-11ef-865b-773bd844d05a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.72 + 100.64.15.72 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.230 + 100.64.21.230 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719712549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfbf3300-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfbf3300-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfbf3300-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfbf3300-3683-11ef-865b-773bd844d05a + + + diff --git a/graph/incidents_graphml/d/dfc3c940-1166-11ed-8727-e3874c058ed5.graphml b/graph/incidents_graphml/d/dfc3c940-1166-11ed-8727-e3874c058ed5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2929a8666f38f7eec79909a917faf7bc5db37e04 --- /dev/null +++ b/graph/incidents_graphml/d/dfc3c940-1166-11ed-8727-e3874c058ed5.graphml @@ -0,0 +1,625 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.92 + 100.64.74.92 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.133 + 100.64.72.133 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.93 + 100.64.74.93 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.51 + 100.64.73.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.94 + 100.64.74.94 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.156 + 100.64.71.156 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.58 + 100.64.72.58 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.91 + 100.64.72.91 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.128 + 100.64.71.128 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.8 + 100.64.74.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.95 + 100.64.74.95 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.248 + 100.64.70.248 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.4 + 100.64.72.4 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.74.96 + 100.64.74.96 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.233 + 100.64.71.233 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.77 + 100.64.73.77 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.75 + 100.64.73.75 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + INCIDENT_LINK + 1659336905 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfc3c940-1166-11ed-8727-e3874c058ed5 + + + diff --git a/graph/incidents_graphml/d/dfc4a840-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/d/dfc4a840-5b2c-11ee-a5b1-e563b721d2c6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7791860eff0bce903a46f3cf728abbaa76ddc561 --- /dev/null +++ b/graph/incidents_graphml/d/dfc4a840-5b2c-11ee-a5b1-e563b721d2c6.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Host","Exploiting Target"] + 0.81015625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.175 + 100.64.68.175 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.176 + 100.64.68.176 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + INCIDENT_LINK + 1695595878 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfc4a840-5b2c-11ee-a5b1-e563b721d2c6 + + + diff --git a/graph/incidents_graphml/d/dfcffbe0-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/d/dfcffbe0-3683-11ef-865b-773bd844d05a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..621d0ad7f88b0484a6846b18ae442f5204fb19b8 --- /dev/null +++ b/graph/incidents_graphml/d/dfcffbe0-3683-11ef-865b-773bd844d05a.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.232 + 100.64.21.232 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.176 + 100.64.5.176 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.233 + USER-0015-1231.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719712549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfcffbe0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfcffbe0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfcffbe0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfcffbe0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfcffbe0-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712549 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dfcffbe0-3683-11ef-865b-773bd844d05a + + + diff --git a/graph/incidents_graphml/d/dfd2ba20-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/d/dfd2ba20-71b6-11ee-b078-c3c891418ab6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe090a21e1644166a487a2dc91fd261e1598f3ee --- /dev/null +++ b/graph/incidents_graphml/d/dfd2ba20-71b6-11ee-b078-c3c891418ab6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.133 + 100.64.11.133 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698074074 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dfd2ba20-71b6-11ee-b078-c3c891418ab6 + + + diff --git a/graph/incidents_graphml/d/dfd4be00-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/dfd4be00-6e29-11ee-b3d5-39e2e796f8b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcbdaa6a882656116e0cb4112827c6c84a85b551 --- /dev/null +++ b/graph/incidents_graphml/d/dfd4be00-6e29-11ee-b3d5-39e2e796f8b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.206 + 100.64.51.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697683662 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfd4be00-6e29-11ee-b3d5-39e2e796f8b3 + + + diff --git a/graph/incidents_graphml/d/dfdbf560-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/d/dfdbf560-54cc-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..034050d593a2040ee4b9e3579b59b0990041e523 --- /dev/null +++ b/graph/incidents_graphml/d/dfdbf560-54cc-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.122 + 100.64.30.122 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694894940 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + dfdbf560-54cc-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/d/dfe07350-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/d/dfe07350-5ebe-11ee-b36b-27983c746e66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..982da52acd1d027a072d7f839622d460ef1a0712 --- /dev/null +++ b/graph/incidents_graphml/d/dfe07350-5ebe-11ee-b36b-27983c746e66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.123 + 100.64.38.123 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695988438 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dfe07350-5ebe-11ee-b36b-27983c746e66 + + + diff --git a/graph/incidents_graphml/d/dfe44e60-6e29-11ee-b3d5-39e2e796f8b3.graphml b/graph/incidents_graphml/d/dfe44e60-6e29-11ee-b3d5-39e2e796f8b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6566f8bbe2b4c0ad7ce5f567b04b6fcfba2118c9 --- /dev/null +++ b/graph/incidents_graphml/d/dfe44e60-6e29-11ee-b3d5-39e2e796f8b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.206 + 100.64.51.206 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697683662 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dfe44e60-6e29-11ee-b3d5-39e2e796f8b3 + + + diff --git a/graph/incidents_graphml/d/dfea9b60-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/d/dfea9b60-54cc-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2202f72ce95948d92b6ce27b4cea6ee0c771a038 --- /dev/null +++ b/graph/incidents_graphml/d/dfea9b60-54cc-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.122 + 100.64.30.122 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694894940 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dfea9b60-54cc-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/d/dfeb37c0-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/d/dfeb37c0-8418-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6d6b37707a887542188a1a6ea7100a6d0bd739ea --- /dev/null +++ b/graph/incidents_graphml/d/dfeb37c0-8418-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.217 + 100.64.5.217 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700095286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + dfeb37c0-8418-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/d/dff17450-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/d/dff17450-0cae-11ee-9176-191794f15128.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da985b2f56318d53875555fed3ab5d89b78fd787 --- /dev/null +++ b/graph/incidents_graphml/d/dff17450-0cae-11ee-9176-191794f15128.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.22.74 + 100.64.22.74 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686965571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + dff17450-0cae-11ee-9176-191794f15128 + + + diff --git a/graph/incidents_graphml/d/dff1b630-1c77-11ee-bf94-2d3c5e21d992.graphml b/graph/incidents_graphml/d/dff1b630-1c77-11ee-bf94-2d3c5e21d992.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ffc6ed2a7d8d861466fd2942f9ec0e7b1a19b785 --- /dev/null +++ b/graph/incidents_graphml/d/dff1b630-1c77-11ee-bf94-2d3c5e21d992.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688701168 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + dff1b630-1c77-11ee-bf94-2d3c5e21d992 + + + diff --git a/graph/incidents_graphml/d/dff47c10-74ad-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/d/dff47c10-74ad-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..957af5b9d07f231cfa341d4dc265aff53504180a --- /dev/null +++ b/graph/incidents_graphml/d/dff47c10-74ad-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.242 + 100.64.12.242 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698400063 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dff47c10-74ad-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/d/dff96890-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/d/dff96890-8418-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9e8790566c337deb65de2e6ade9f839ce835e05 --- /dev/null +++ b/graph/incidents_graphml/d/dff96890-8418-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.217 + 100.64.5.217 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700095286 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + dff96890-8418-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/e/e00639d0-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e00639d0-8418-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da6f746b1bed7405e2479a04089ddcd4f8660378 --- /dev/null +++ b/graph/incidents_graphml/e/e00639d0-8418-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.167 + 100.64.16.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700095286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e00639d0-8418-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/e/e0076d50-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e0076d50-0cae-11ee-9176-191794f15128.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a933d19ecc59546ce472b1c86cbeb4cf1b40ec19 --- /dev/null +++ b/graph/incidents_graphml/e/e0076d50-0cae-11ee-9176-191794f15128.graphml @@ -0,0 +1,121 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.74 + 100.64.21.74 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.170 + HOST-14697 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.116 + 100.64.72.116 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.29.13 + 100.64.29.13 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686965571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0076d50-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0076d50-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0076d50-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965571 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0076d50-0cae-11ee-9176-191794f15128 + + + diff --git a/graph/incidents_graphml/e/e00dc750-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/e/e00dc750-71b6-11ee-b078-c3c891418ab6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77bcf82f9d848b297f686d1d8e879bc7594ebd5d --- /dev/null +++ b/graph/incidents_graphml/e/e00dc750-71b6-11ee-b078-c3c891418ab6.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698074075 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e00dc750-71b6-11ee-b078-c3c891418ab6 + + + INCIDENT_LINK + 1698074075 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e00dc750-71b6-11ee-b078-c3c891418ab6 + + + diff --git a/graph/incidents_graphml/e/e00ee9d0-3a81-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/e/e00ee9d0-3a81-11ee-b55b-6596b150fac1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba2469fc40f2b2a4ad7044a5b720045abfb6abde --- /dev/null +++ b/graph/incidents_graphml/e/e00ee9d0-3a81-11ee-b55b-6596b150fac1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.6 + 100.64.41.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692003997 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e00ee9d0-3a81-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692003997 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e00ee9d0-3a81-11ee-b55b-6596b150fac1 + + + diff --git a/graph/incidents_graphml/e/e0155500-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e0155500-8418-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b70f64e6eaf0ee718844b9832aab49fcdbe224b9 --- /dev/null +++ b/graph/incidents_graphml/e/e0155500-8418-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.167 + 100.64.16.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700095286 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0155500-8418-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/e/e01750b0-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/e/e01750b0-54cc-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..128ebea50ca699a1637b3520291d5e4f1404b97a --- /dev/null +++ b/graph/incidents_graphml/e/e01750b0-54cc-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.220 + 100.64.23.220 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694894940 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e01750b0-54cc-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/e/e01827f0-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e01827f0-2da4-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7484d473884859b10cbce46183a082b70435acf1 --- /dev/null +++ b/graph/incidents_graphml/e/e01827f0-2da4-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.171 + 100.64.37.171 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690589665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e01827f0-2da4-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/e/e01bdfb0-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e01bdfb0-0cae-11ee-9176-191794f15128.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e28d1eca5fe612a0f270efa667428e8665b5dd3c --- /dev/null +++ b/graph/incidents_graphml/e/e01bdfb0-0cae-11ee-9176-191794f15128.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.246 + 100.64.48.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.219 + 100.64.71.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686965572 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e01bdfb0-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965572 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e01bdfb0-0cae-11ee-9176-191794f15128 + + + diff --git a/graph/incidents_graphml/e/e022aee0-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/e/e022aee0-71b6-11ee-b078-c3c891418ab6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57954852fa4352f943eb96c7468a24e03e45f2ea --- /dev/null +++ b/graph/incidents_graphml/e/e022aee0-71b6-11ee-b078-c3c891418ab6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698074075 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e022aee0-71b6-11ee-b078-c3c891418ab6 + + + diff --git a/graph/incidents_graphml/e/e0243220-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e0243220-766f-11ee-81bc-199b4060a9b4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf03e9c608167cee0912495bafe8b3722bdd47d5 --- /dev/null +++ b/graph/incidents_graphml/e/e0243220-766f-11ee-81bc-199b4060a9b4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.141 + 100.64.22.141 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698593336 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0243220-766f-11ee-81bc-199b4060a9b4 + + + diff --git a/graph/incidents_graphml/e/e02819b0-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e02819b0-8418-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..700096588d365cb5e837b55bda71e909cff409f4 --- /dev/null +++ b/graph/incidents_graphml/e/e02819b0-8418-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.164 + 100.64.16.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700095287 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e02819b0-8418-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/e/e02a76c0-11ca-11ef-a994-fb0e1dc0413b.graphml b/graph/incidents_graphml/e/e02a76c0-11ca-11ef-a994-fb0e1dc0413b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e36914d3fb40927c6852b94a1b69c66eb131fde --- /dev/null +++ b/graph/incidents_graphml/e/e02a76c0-11ca-11ef-a994-fb0e1dc0413b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.242 + 100.64.66.242 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715674851 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e02a76c0-11ca-11ef-a994-fb0e1dc0413b + + + diff --git a/graph/incidents_graphml/e/e0328d60-71b6-11ee-b078-c3c891418ab6.graphml b/graph/incidents_graphml/e/e0328d60-71b6-11ee-b078-c3c891418ab6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72ac8df4a5a144fc7768f5dfaa2f49aead177351 --- /dev/null +++ b/graph/incidents_graphml/e/e0328d60-71b6-11ee-b078-c3c891418ab6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.50 + 100.64.51.50 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698074075 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0328d60-71b6-11ee-b078-c3c891418ab6 + + + diff --git a/graph/incidents_graphml/e/e0358230-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e0358230-0cae-11ee-9176-191794f15128.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5c9afb0ee8aa4deb49a9eb6ccfe8895050f8eaa --- /dev/null +++ b/graph/incidents_graphml/e/e0358230-0cae-11ee-9176-191794f15128.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.237 + 100.64.77.237 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686965572 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0358230-0cae-11ee-9176-191794f15128 + + + diff --git a/graph/incidents_graphml/e/e0367190-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e0367190-8418-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c73826b5a51d1a13192fcdc8ae6346a3dccb1f4 --- /dev/null +++ b/graph/incidents_graphml/e/e0367190-8418-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.164 + 100.64.16.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700095287 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e0367190-8418-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/e/e03b63a0-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e03b63a0-766f-11ee-81bc-199b4060a9b4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a55bacb01d33d0cfbeae936ddc3d13c499a7d2a --- /dev/null +++ b/graph/incidents_graphml/e/e03b63a0-766f-11ee-81bc-199b4060a9b4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.141 + 100.64.22.141 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698593337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e03b63a0-766f-11ee-81bc-199b4060a9b4 + + + diff --git a/graph/incidents_graphml/e/e03b8e70-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e03b8e70-2da4-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1559d471332c1569a4bb61baffb03dcd4578eaf --- /dev/null +++ b/graph/incidents_graphml/e/e03b8e70-2da4-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.171 + 100.64.37.171 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690589665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e03b8e70-2da4-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/e/e0512080-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e0512080-0cae-11ee-9176-191794f15128.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e10216efd3e0944c2360dd6bc16b177ec55bbea --- /dev/null +++ b/graph/incidents_graphml/e/e0512080-0cae-11ee-9176-191794f15128.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.237 + 100.64.77.237 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686965572 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e0512080-0cae-11ee-9176-191794f15128 + + + diff --git a/graph/incidents_graphml/e/e05a19b0-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e05a19b0-6fe1-11ee-ab93-b9aa077096ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d571fe43f81f701039caf7bf34e4f3c61f4c70e --- /dev/null +++ b/graph/incidents_graphml/e/e05a19b0-6fe1-11ee-ab93-b9aa077096ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.29 + 100.64.17.29 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697872641 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e05a19b0-6fe1-11ee-ab93-b9aa077096ae + + + diff --git a/graph/incidents_graphml/e/e05b2720-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/e/e05b2720-0bf4-11ee-9b02-ffb3de173f5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..259d55315ef5c379f697ced1ec12db0b59f49325 --- /dev/null +++ b/graph/incidents_graphml/e/e05b2720-0bf4-11ee-9b02-ffb3de173f5d.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.237 + 100.64.60.237 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.21 + 100.64.71.21 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.7.150 + 100.64.7.150 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686885685 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e05b2720-0bf4-11ee-9b02-ffb3de173f5d + + + INCIDENT_LINK + 1686885685 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e05b2720-0bf4-11ee-9b02-ffb3de173f5d + + + INCIDENT_LINK + 1686885685 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e05b2720-0bf4-11ee-9b02-ffb3de173f5d + + + INCIDENT_LINK + 1686885685 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e05b2720-0bf4-11ee-9b02-ffb3de173f5d + + + diff --git a/graph/incidents_graphml/e/e05e92e0-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/e/e05e92e0-54cc-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a26e7854c238921824cf698ec8ab784878191c0b --- /dev/null +++ b/graph/incidents_graphml/e/e05e92e0-54cc-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.124 + 100.64.30.124 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694894941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e05e92e0-54cc-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/e/e05f9130-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e05f9130-2da4-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e22363b52b6d02fc0356f09286ba9c652a868f79 --- /dev/null +++ b/graph/incidents_graphml/e/e05f9130-2da4-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.241 + 100.64.9.241 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690589665 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e05f9130-2da4-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/e/e0651db0-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e0651db0-0cae-11ee-9176-191794f15128.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b7d4f9f44744f2388022055fcf8f07d206580a9 --- /dev/null +++ b/graph/incidents_graphml/e/e0651db0-0cae-11ee-9176-191794f15128.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.247 + 100.64.23.247 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.52 + 100.64.72.52 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686965573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0651db0-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0651db0-0cae-11ee-9176-191794f15128 + + + diff --git a/graph/incidents_graphml/e/e065f700-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/e/e065f700-5ebe-11ee-b36b-27983c746e66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68b47cd987436aec184e6a03e63abe5e30b8233b --- /dev/null +++ b/graph/incidents_graphml/e/e065f700-5ebe-11ee-b36b-27983c746e66.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.125 + 100.64.11.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695988439 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e065f700-5ebe-11ee-b36b-27983c746e66 + + + INCIDENT_LINK + 1695988439 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e065f700-5ebe-11ee-b36b-27983c746e66 + + + diff --git a/graph/incidents_graphml/e/e06a1f40-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e06a1f40-6fe1-11ee-ab93-b9aa077096ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b112dfd37dba779fc865d83240df1409b4371062 --- /dev/null +++ b/graph/incidents_graphml/e/e06a1f40-6fe1-11ee-ab93-b9aa077096ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.29 + 100.64.17.29 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697872641 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e06a1f40-6fe1-11ee-ab93-b9aa077096ae + + + diff --git a/graph/incidents_graphml/e/e06a4250-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/e/e06a4250-0bf4-11ee-9b02-ffb3de173f5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94c096830655f22a8ee1c80326309be06d5bfc47 --- /dev/null +++ b/graph/incidents_graphml/e/e06a4250-0bf4-11ee-9b02-ffb3de173f5d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.52 + 100.64.31.52 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.80.204 + 100.64.80.204 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686885686 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e06a4250-0bf4-11ee-9b02-ffb3de173f5d + + + INCIDENT_LINK + 1686885686 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e06a4250-0bf4-11ee-9b02-ffb3de173f5d + + + diff --git a/graph/incidents_graphml/e/e06d11d0-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/e/e06d11d0-54cc-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85a485c04247e7d43a1f3eea9981880db210d394 --- /dev/null +++ b/graph/incidents_graphml/e/e06d11d0-54cc-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.124 + 100.64.30.124 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694894941 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e06d11d0-54cc-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/e/e0734310-71ba-11ee-ba6f-c94c097ae35c.graphml b/graph/incidents_graphml/e/e0734310-71ba-11ee-ba6f-c94c097ae35c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..964a793bb4473c1994b9cf64d21fbb940cd8db88 --- /dev/null +++ b/graph/incidents_graphml/e/e0734310-71ba-11ee-ba6f-c94c097ae35c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.53.83 + 172.31.53.83 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 10.181.72.179 + 10.181.72.179 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1698075793 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e0734310-71ba-11ee-ba6f-c94c097ae35c + + + diff --git a/graph/incidents_graphml/e/e0775c20-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/e/e0775c20-5ebe-11ee-b36b-27983c746e66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ed44e2a778f45928ea59252ced48f442a598d6c --- /dev/null +++ b/graph/incidents_graphml/e/e0775c20-5ebe-11ee-b36b-27983c746e66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.125 + 100.64.11.125 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695988439 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e0775c20-5ebe-11ee-b36b-27983c746e66 + + + diff --git a/graph/incidents_graphml/e/e077f700-f0fb-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/e/e077f700-f0fb-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..597f2e3f9869ef52a4d3b252f3c2cf17082e42a5 --- /dev/null +++ b/graph/incidents_graphml/e/e077f700-f0fb-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.170 + 100.64.25.170 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712067508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e077f700-f0fb-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/e/e07a72f0-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e07a72f0-6fe1-11ee-ab93-b9aa077096ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20068642d1dc291c9a4ca714d70c45053596b8de --- /dev/null +++ b/graph/incidents_graphml/e/e07a72f0-6fe1-11ee-ab93-b9aa077096ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.31 + 100.64.17.31 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697872642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e07a72f0-6fe1-11ee-ab93-b9aa077096ae + + + diff --git a/graph/incidents_graphml/e/e07b90c0-54cc-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/e/e07b90c0-54cc-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f2ada6ca51f11e1482d62462e67e2090f4f7bd84 --- /dev/null +++ b/graph/incidents_graphml/e/e07b90c0-54cc-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.126 + 100.64.30.126 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694894941 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e07b90c0-54cc-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/e/e07c9110-1c77-11ee-bf94-2d3c5e21d992.graphml b/graph/incidents_graphml/e/e07c9110-1c77-11ee-bf94-2d3c5e21d992.graphml new file mode 100644 index 0000000000000000000000000000000000000000..898f8e80f5ecc88fc687e89db07852de52e267c3 --- /dev/null +++ b/graph/incidents_graphml/e/e07c9110-1c77-11ee-bf94-2d3c5e21d992.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.164 + 100.64.48.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688701168 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e07c9110-1c77-11ee-bf94-2d3c5e21d992 + + + diff --git a/graph/incidents_graphml/e/e08396c0-71ba-11ee-ba6f-c94c097ae35c.graphml b/graph/incidents_graphml/e/e08396c0-71ba-11ee-ba6f-c94c097ae35c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c5ea4904508da9b6e044360a5265b139dfc8295 --- /dev/null +++ b/graph/incidents_graphml/e/e08396c0-71ba-11ee-ba6f-c94c097ae35c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.181.72.179 + 10.181.72.179 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 172.31.53.83 + 172.31.53.83 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + INCIDENT_LINK + 1698075794 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e08396c0-71ba-11ee-ba6f-c94c097ae35c + + + diff --git a/graph/incidents_graphml/e/e083df00-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e083df00-3312-11ed-a5b7-31dcf2c00f36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a21713a70a298fa45b3b72c7f88f47da1ca3654 --- /dev/null +++ b/graph/incidents_graphml/e/e083df00-3312-11ed-a5b7-31dcf2c00f36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.94.94 + 100.64.94.94 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663039168 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e083df00-3312-11ed-a5b7-31dcf2c00f36 + + + diff --git a/graph/incidents_graphml/e/e087af90-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e087af90-3312-11ed-a5b7-31dcf2c00f36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52449206a8c203f9777b3574045d46d374302d55 --- /dev/null +++ b/graph/incidents_graphml/e/e087af90-3312-11ed-a5b7-31dcf2c00f36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.11.13 + 100.64.11.13 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663039168 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e087af90-3312-11ed-a5b7-31dcf2c00f36 + + + diff --git a/graph/incidents_graphml/e/e088cad0-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e088cad0-6fe1-11ee-ab93-b9aa077096ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b0e72c0939eb6848e9a4c1027cccb350b01afc9 --- /dev/null +++ b/graph/incidents_graphml/e/e088cad0-6fe1-11ee-ab93-b9aa077096ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.31 + 100.64.17.31 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697872642 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e088cad0-6fe1-11ee-ab93-b9aa077096ae + + + diff --git a/graph/incidents_graphml/e/e089aa40-f0fb-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/e/e089aa40-f0fb-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7286829bf89e518706787249e891e24a268552c --- /dev/null +++ b/graph/incidents_graphml/e/e089aa40-f0fb-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.170 + 100.64.25.170 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712067509 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e089aa40-f0fb-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/e/e08edb80-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e08edb80-3312-11ed-a5b7-31dcf2c00f36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61923acfc0cd3dc6fefa2468dab21bdfbe8d0cc9 --- /dev/null +++ b/graph/incidents_graphml/e/e08edb80-3312-11ed-a5b7-31dcf2c00f36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.165 + 100.64.12.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663039168 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e08edb80-3312-11ed-a5b7-31dcf2c00f36 + + + diff --git a/graph/incidents_graphml/e/e0954420-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e0954420-3312-11ed-a5b7-31dcf2c00f36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67ca96a05ce76c2c69e8af03afb3ca115bbf9b67 --- /dev/null +++ b/graph/incidents_graphml/e/e0954420-3312-11ed-a5b7-31dcf2c00f36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.12.165 + 100.64.12.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663039168 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0954420-3312-11ed-a5b7-31dcf2c00f36 + + + diff --git a/graph/incidents_graphml/e/e098c690-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e098c690-3312-11ed-a5b7-31dcf2c00f36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f3aef4828da2e4a01effe9a4b694f68bfec22a5 --- /dev/null +++ b/graph/incidents_graphml/e/e098c690-3312-11ed-a5b7-31dcf2c00f36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.102 + 100.64.94.102 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663039168 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e098c690-3312-11ed-a5b7-31dcf2c00f36 + + + diff --git a/graph/incidents_graphml/e/e0a24e80-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/e/e0a24e80-fc2b-11ed-b0ec-2b4cf5491294.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9ec2a2cc302d4c4ccf7bfab8c1e52909e11a2bd --- /dev/null +++ b/graph/incidents_graphml/e/e0a24e80-fc2b-11ed-b0ec-2b4cf5491294.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.88 + 100.64.35.88 + [] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685150090 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e0a24e80-fc2b-11ed-b0ec-2b4cf5491294 + + + diff --git a/graph/incidents_graphml/e/e0a96e40-71ba-11ee-ba6f-c94c097ae35c.graphml b/graph/incidents_graphml/e/e0a96e40-71ba-11ee-ba6f-c94c097ae35c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1aefc5083419c9abd8c23cb1d8bc3eeaa08f915 --- /dev/null +++ b/graph/incidents_graphml/e/e0a96e40-71ba-11ee-ba6f-c94c097ae35c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.121.20 + 172.21.121.20 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.90.115 + 100.64.90.115 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1698075794 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e0a96e40-71ba-11ee-ba6f-c94c097ae35c + + + INCIDENT_LINK + 1698075794 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e0a96e40-71ba-11ee-ba6f-c94c097ae35c + + + diff --git a/graph/incidents_graphml/e/e0ac4e90-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e0ac4e90-3312-11ed-a5b7-31dcf2c00f36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f6b13659181834520caa0e22d632b12d6af241c --- /dev/null +++ b/graph/incidents_graphml/e/e0ac4e90-3312-11ed-a5b7-31dcf2c00f36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.85 + 100.64.84.85 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1663039169 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0ac4e90-3312-11ed-a5b7-31dcf2c00f36 + + + diff --git a/graph/incidents_graphml/e/e0aca1c0-1c77-11ee-bf94-2d3c5e21d992.graphml b/graph/incidents_graphml/e/e0aca1c0-1c77-11ee-bf94-2d3c5e21d992.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85562b2be6d5a151462784fb6a41055bcca73b44 --- /dev/null +++ b/graph/incidents_graphml/e/e0aca1c0-1c77-11ee-bf94-2d3c5e21d992.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688701169 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0aca1c0-1c77-11ee-bf94-2d3c5e21d992 + + + diff --git a/graph/incidents_graphml/e/e0b32c60-3312-11ed-a5b7-31dcf2c00f36.graphml b/graph/incidents_graphml/e/e0b32c60-3312-11ed-a5b7-31dcf2c00f36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7af4339352fbe1b0db8beb105e32e4323e0be6a1 --- /dev/null +++ b/graph/incidents_graphml/e/e0b32c60-3312-11ed-a5b7-31dcf2c00f36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.84.85 + 100.64.84.85 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1663039169 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0b32c60-3312-11ed-a5b7-31dcf2c00f36 + + + diff --git a/graph/incidents_graphml/e/e0b611e0-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e0b611e0-766f-11ee-81bc-199b4060a9b4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51dad858faf4a5499240141a044ca11a26c07b89 --- /dev/null +++ b/graph/incidents_graphml/e/e0b611e0-766f-11ee-81bc-199b4060a9b4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.132 + 100.64.24.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698593337 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0b611e0-766f-11ee-81bc-199b4060a9b4 + + + diff --git a/graph/incidents_graphml/e/e0b95d30-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e0b95d30-8418-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ed7410db7e95921a74dbe8cba868b7c656078ac --- /dev/null +++ b/graph/incidents_graphml/e/e0b95d30-8418-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.169 + 100.64.16.169 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700095288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e0b95d30-8418-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/e/e0c0fa10-fc2b-11ed-b0ec-2b4cf5491294.graphml b/graph/incidents_graphml/e/e0c0fa10-fc2b-11ed-b0ec-2b4cf5491294.graphml new file mode 100644 index 0000000000000000000000000000000000000000..541aec74f7323b81e78dd660e82f50e391c1f2f2 --- /dev/null +++ b/graph/incidents_graphml/e/e0c0fa10-fc2b-11ed-b0ec-2b4cf5491294.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.35.88 + 100.64.35.88 + [] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685150090 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e0c0fa10-fc2b-11ed-b0ec-2b4cf5491294 + + + diff --git a/graph/incidents_graphml/e/e0c3d340-1c77-11ee-bf94-2d3c5e21d992.graphml b/graph/incidents_graphml/e/e0c3d340-1c77-11ee-bf94-2d3c5e21d992.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f6018d8528d086dcd1f69f251e74705a1f2011d --- /dev/null +++ b/graph/incidents_graphml/e/e0c3d340-1c77-11ee-bf94-2d3c5e21d992.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.90 + 100.64.11.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688701169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0c3d340-1c77-11ee-bf94-2d3c5e21d992 + + + diff --git a/graph/incidents_graphml/e/e0c6dac0-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e0c6dac0-766f-11ee-81bc-199b4060a9b4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..514e96f1fa23f5ca0056801317203543560ef160 --- /dev/null +++ b/graph/incidents_graphml/e/e0c6dac0-766f-11ee-81bc-199b4060a9b4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.132 + 100.64.24.132 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698593338 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0c6dac0-766f-11ee-81bc-199b4060a9b4 + + + diff --git a/graph/incidents_graphml/e/e0c7b510-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e0c7b510-8418-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7093f8ca01360543eb5248f0480565177cbbb78c --- /dev/null +++ b/graph/incidents_graphml/e/e0c7b510-8418-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.169 + 100.64.16.169 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700095288 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0c7b510-8418-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/e/e0d45d60-56b4-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/e/e0d45d60-56b4-11ee-be44-f1fe26834d88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9ca82b2265a2a10385d5bc489d6530ed8ae59ae9 --- /dev/null +++ b/graph/incidents_graphml/e/e0d45d60-56b4-11ee-be44-f1fe26834d88.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.203 + 100.64.23.203 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1695104536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0d45d60-56b4-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695104536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0d45d60-56b4-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695104536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0d45d60-56b4-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695104536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0d45d60-56b4-11ee-be44-f1fe26834d88 + + + diff --git a/graph/incidents_graphml/e/e0d4bd70-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e0d4bd70-766f-11ee-81bc-199b4060a9b4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76b856d64d15f3e45513c095ffe4adbb52b8f36f --- /dev/null +++ b/graph/incidents_graphml/e/e0d4bd70-766f-11ee-81bc-199b4060a9b4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.134 + 100.64.24.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698593338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0d4bd70-766f-11ee-81bc-199b4060a9b4 + + + diff --git a/graph/incidents_graphml/e/e0d82fd0-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e0d82fd0-8418-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f9cdcd3d48a40056df27d6ff4907cc9f8b2a0a4 --- /dev/null +++ b/graph/incidents_graphml/e/e0d82fd0-8418-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.171 + 100.64.16.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700095288 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0d82fd0-8418-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/e/e0da4220-9f34-11ee-ab4f-6ff6fea5e350.graphml b/graph/incidents_graphml/e/e0da4220-9f34-11ee-ab4f-6ff6fea5e350.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ed9cdf26652873df1f1aa4b8d862bbc7a5608a3 --- /dev/null +++ b/graph/incidents_graphml/e/e0da4220-9f34-11ee-ab4f-6ff6fea5e350.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.142 + 100.64.49.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.156 + 100.64.49.156 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703075995 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0da4220-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075995 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0da4220-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075995 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0da4220-9f34-11ee-ab4f-6ff6fea5e350 + + + INCIDENT_LINK + 1703075995 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0da4220-9f34-11ee-ab4f-6ff6fea5e350 + + + diff --git a/graph/incidents_graphml/e/e0db2700-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/e/e0db2700-576b-11ee-b369-595b8ff2e388.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be04b7ef5382e3e8820b23957addb9f79f007c53 --- /dev/null +++ b/graph/incidents_graphml/e/e0db2700-576b-11ee-b369-595b8ff2e388.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.76 + 100.64.54.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695183134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0db2700-576b-11ee-b369-595b8ff2e388 + + + diff --git a/graph/incidents_graphml/e/e0e3b190-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e0e3b190-766f-11ee-81bc-199b4060a9b4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf6ee257301c36bd9ae9f074d31dd1bfdcb24fbe --- /dev/null +++ b/graph/incidents_graphml/e/e0e3b190-766f-11ee-81bc-199b4060a9b4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.134 + 100.64.24.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698593338 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0e3b190-766f-11ee-81bc-199b4060a9b4 + + + diff --git a/graph/incidents_graphml/e/e0f14620-766f-11ee-81bc-199b4060a9b4.graphml b/graph/incidents_graphml/e/e0f14620-766f-11ee-81bc-199b4060a9b4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83065239e799a0d3a72e9e3b952bd54a7b14836a --- /dev/null +++ b/graph/incidents_graphml/e/e0f14620-766f-11ee-81bc-199b4060a9b4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.22 + 100.64.8.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698593338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e0f14620-766f-11ee-81bc-199b4060a9b4 + + + diff --git a/graph/incidents_graphml/e/e0fbaa20-39d9-11ee-b92b-37d2cd449a32.graphml b/graph/incidents_graphml/e/e0fbaa20-39d9-11ee-b92b-37d2cd449a32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4db789659aeeb80cde2b6a4dd6ed1b48c4ab3634 --- /dev/null +++ b/graph/incidents_graphml/e/e0fbaa20-39d9-11ee-b92b-37d2cd449a32.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.25 + 100.64.8.25 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.224 + 100.64.54.224 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.225 + 100.64.54.225 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.226 + 100.64.54.226 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.51 + 100.64.40.51 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.227 + 100.64.54.227 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.228 + 100.64.54.228 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.229 + 100.64.54.229 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.71 + 100.64.10.71 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.230 + 100.64.54.230 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.90 + 100.64.31.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.42 + 100.64.9.42 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.133 + 100.64.45.133 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.231 + 100.64.54.231 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.25 + 100.64.12.25 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + INCIDENT_LINK + 1691931844 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e0fbaa20-39d9-11ee-b92b-37d2cd449a32 + + + diff --git a/graph/incidents_graphml/e/e0ff2f60-71ba-11ee-ba6f-c94c097ae35c.graphml b/graph/incidents_graphml/e/e0ff2f60-71ba-11ee-ba6f-c94c097ae35c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..800b992eb5046dc6b72d6c4e6e148ccecf14aa04 --- /dev/null +++ b/graph/incidents_graphml/e/e0ff2f60-71ba-11ee-ba6f-c94c097ae35c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.216.198 + 172.25.216.198 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.87.128 + 100.64.87.128 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1698075794 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e0ff2f60-71ba-11ee-ba6f-c94c097ae35c + + + diff --git a/graph/incidents_graphml/e/e1000030-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e1000030-6b0b-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1bf76cf454e8c6bbc7a341afd219948eaad9899d --- /dev/null +++ b/graph/incidents_graphml/e/e1000030-6b0b-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.234 + 100.64.66.234 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697340925 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e1000030-6b0b-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/e/e1021980-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e1021980-6fe1-11ee-ab93-b9aa077096ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5bde85e68141946b9836b12fd8ec56fc76218776 --- /dev/null +++ b/graph/incidents_graphml/e/e1021980-6fe1-11ee-ab93-b9aa077096ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.33 + 100.64.17.33 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697872642 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1021980-6fe1-11ee-ab93-b9aa077096ae + + + diff --git a/graph/incidents_graphml/e/e10e5920-56b4-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/e/e10e5920-56b4-11ee-be44-f1fe26834d88.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb49f885cabbe9b5c106ff33ae1b3bd2429f2664 --- /dev/null +++ b/graph/incidents_graphml/e/e10e5920-56b4-11ee-be44-f1fe26834d88.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.22.167 + 100.64.22.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.46 + 100.64.69.46 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695104536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e10e5920-56b4-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695104536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e10e5920-56b4-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695104536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e10e5920-56b4-11ee-be44-f1fe26834d88 + + + INCIDENT_LINK + 1695104536 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e10e5920-56b4-11ee-be44-f1fe26834d88 + + + diff --git a/graph/incidents_graphml/e/e113ccc0-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e113ccc0-6fe1-11ee-ab93-b9aa077096ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bbaff1924e344c9bb403e53fa214c136cd72f443 --- /dev/null +++ b/graph/incidents_graphml/e/e113ccc0-6fe1-11ee-ab93-b9aa077096ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.33 + 100.64.17.33 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697872643 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e113ccc0-6fe1-11ee-ab93-b9aa077096ae + + + diff --git a/graph/incidents_graphml/e/e115bcb0-ed78-11ed-a662-a9c0e7c292a4.graphml b/graph/incidents_graphml/e/e115bcb0-ed78-11ed-a662-a9c0e7c292a4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cec1f19e65569119597883bd90c1915dead99adf --- /dev/null +++ b/graph/incidents_graphml/e/e115bcb0-ed78-11ed-a662-a9c0e7c292a4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.187 + 100.64.68.187 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1683533894 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e115bcb0-ed78-11ed-a662-a9c0e7c292a4 + + + INCIDENT_LINK + 1683533894 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e115bcb0-ed78-11ed-a662-a9c0e7c292a4 + + + diff --git a/graph/incidents_graphml/e/e11a79d0-3dbf-11ed-af1b-23b3512944ca.graphml b/graph/incidents_graphml/e/e11a79d0-3dbf-11ed-af1b-23b3512944ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7993c6b5206d6c822317d00a3631b83c99231aa2 --- /dev/null +++ b/graph/incidents_graphml/e/e11a79d0-3dbf-11ed-af1b-23b3512944ca.graphml @@ -0,0 +1,828 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + CRED + CRED-0013 + ["Suspicious User"] + 0.25 + ["Barracuda WAF"] + + + HOST + 100.64.84.174 + 100.64.84.174 + [] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.17.248 + 100.64.17.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.84.175 + 100.64.84.175 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.76.90 + 100.64.76.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.84.176 + 100.64.84.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.79.157 + 100.64.79.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.84.177 + 100.64.84.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.84.178 + 100.64.84.178 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.83.90 + 100.64.83.90 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.84.179 + 100.64.84.179 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.84.180 + 100.64.84.180 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.51 + 100.64.25.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.84.181 + 100.64.84.181 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.84.182 + 100.64.84.182 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.84.183 + 100.64.84.183 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.180 + 100.64.49.180 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.246 + 100.64.12.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.84.184 + 100.64.84.184 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.84.185 + 100.64.84.185 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.239 + 100.64.27.239 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.125 + 100.64.25.125 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + INCIDENT_LINK + 1664212984 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Suspicious User","Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e11a79d0-3dbf-11ed-af1b-23b3512944ca + + + diff --git a/graph/incidents_graphml/e/e11f10a0-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e11f10a0-2da4-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..afa12c37a3c63c426c7a7ca3aac96febdbaa8e53 --- /dev/null +++ b/graph/incidents_graphml/e/e11f10a0-2da4-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.173 + 100.64.37.173 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690589667 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e11f10a0-2da4-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/e/e121af70-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e121af70-6fe1-11ee-ab93-b9aa077096ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..654688a5208e5605679366db1ff7932be78931ff --- /dev/null +++ b/graph/incidents_graphml/e/e121af70-6fe1-11ee-ab93-b9aa077096ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.35 + 100.64.17.35 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697872643 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e121af70-6fe1-11ee-ab93-b9aa077096ae + + + diff --git a/graph/incidents_graphml/e/e12d4440-71ba-11ee-ba6f-c94c097ae35c.graphml b/graph/incidents_graphml/e/e12d4440-71ba-11ee-ba6f-c94c097ae35c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d617efa07afaf961e141d37e9031eec76968bd77 --- /dev/null +++ b/graph/incidents_graphml/e/e12d4440-71ba-11ee-ba6f-c94c097ae35c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.181.72.179 + 10.181.72.179 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 172.24.106.87 + 172.24.106.87 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1698075795 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e12d4440-71ba-11ee-ba6f-c94c097ae35c + + + diff --git a/graph/incidents_graphml/e/e1318df0-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e1318df0-6fe1-11ee-ab93-b9aa077096ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fb134c5c8b8157c2ce0ec0ed718efd545ab3fad --- /dev/null +++ b/graph/incidents_graphml/e/e1318df0-6fe1-11ee-ab93-b9aa077096ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.35 + 100.64.17.35 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697872643 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e1318df0-6fe1-11ee-ab93-b9aa077096ae + + + diff --git a/graph/incidents_graphml/e/e139e8d0-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/e/e139e8d0-576b-11ee-b369-595b8ff2e388.graphml new file mode 100644 index 0000000000000000000000000000000000000000..964a477a62e00cc6c07f379598e1a76569b54517 --- /dev/null +++ b/graph/incidents_graphml/e/e139e8d0-576b-11ee-b369-595b8ff2e388.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.5 + 100.64.90.5 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1695183134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e139e8d0-576b-11ee-b369-595b8ff2e388 + + + diff --git a/graph/incidents_graphml/e/e1488ed0-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/e/e1488ed0-576b-11ee-b369-595b8ff2e388.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88f888452d6d3c52adc0576b4c4ce561498e91ac --- /dev/null +++ b/graph/incidents_graphml/e/e1488ed0-576b-11ee-b369-595b8ff2e388.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.90.5 + 100.64.90.5 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695183134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e1488ed0-576b-11ee-b369-595b8ff2e388 + + + diff --git a/graph/incidents_graphml/e/e154b2d0-8418-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/e/e154b2d0-8418-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0db6b34e40383e3ff21c5c6661d2e0e85b443a2b --- /dev/null +++ b/graph/incidents_graphml/e/e154b2d0-8418-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.173 + 100.64.16.173 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700095289 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e154b2d0-8418-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/e/e1589460-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/e/e1589460-576b-11ee-b369-595b8ff2e388.graphml new file mode 100644 index 0000000000000000000000000000000000000000..23f4144772ac436360d3aa7f45941713c8a88204 --- /dev/null +++ b/graph/incidents_graphml/e/e1589460-576b-11ee-b369-595b8ff2e388.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.7 + 100.64.90.7 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695183134 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e1589460-576b-11ee-b369-595b8ff2e388 + + + diff --git a/graph/incidents_graphml/e/e15a9380-3683-11ef-865b-773bd844d05a.graphml b/graph/incidents_graphml/e/e15a9380-3683-11ef-865b-773bd844d05a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..274a4082226af9113a1828f2b1d2a6bdbe9e64a5 --- /dev/null +++ b/graph/incidents_graphml/e/e15a9380-3683-11ef-865b-773bd844d05a.graphml @@ -0,0 +1,437 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.236 + 100.64.21.236 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.237 + 100.64.21.237 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.63 + 100.64.8.63 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.238 + 100.64.21.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.239 + 100.64.21.239 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.17 + 100.64.11.17 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.240 + 100.64.21.240 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.241 + 100.64.21.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.242 + USER-0015-1232.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.243 + 100.64.21.243 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + INCIDENT_LINK + 1719712552 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e15a9380-3683-11ef-865b-773bd844d05a + + + diff --git a/graph/incidents_graphml/e/e1738280-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e1738280-6b0b-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65b45d4e202f3522f0c5982fa3256cc099eddc00 --- /dev/null +++ b/graph/incidents_graphml/e/e1738280-6b0b-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.236 + 100.64.66.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697340926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1738280-6b0b-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/e/e17a8e40-fe69-11ed-a136-877286d930e4.graphml b/graph/incidents_graphml/e/e17a8e40-fe69-11ed-a136-877286d930e4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ae04ef72831d4d608fad8576cffca250b97ab68 --- /dev/null +++ b/graph/incidents_graphml/e/e17a8e40-fe69-11ed-a136-877286d930e4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.109 + 100.64.7.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685396622 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e17a8e40-fe69-11ed-a136-877286d930e4 + + + diff --git a/graph/incidents_graphml/e/e17e5850-3a81-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/e/e17e5850-3a81-11ee-b55b-6596b150fac1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4659f47a835b01bb02f2694dbcac2647348825b1 --- /dev/null +++ b/graph/incidents_graphml/e/e17e5850-3a81-11ee-b55b-6596b150fac1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.75 + 100.64.7.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692004000 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e17e5850-3a81-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004000 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e17e5850-3a81-11ee-b55b-6596b150fac1 + + + diff --git a/graph/incidents_graphml/e/e1822880-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e1822880-6b0b-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c61ea444fc413c4800e07fb70abdad54aed2e58 --- /dev/null +++ b/graph/incidents_graphml/e/e1822880-6b0b-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.236 + 100.64.66.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697340926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e1822880-6b0b-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/e/e185b2d0-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e185b2d0-479c-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43578e38282baecb47ee8b39c084b1f302b11f18 --- /dev/null +++ b/graph/incidents_graphml/e/e185b2d0-479c-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.175 + 100.64.12.175 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693444961 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e185b2d0-479c-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/e/e18eaba0-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e18eaba0-6b0b-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..529c03f2e115c4c0f38633f9ece9725a1c5ad26f --- /dev/null +++ b/graph/incidents_graphml/e/e18eaba0-6b0b-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.238 + 100.64.66.238 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697340926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e18eaba0-6b0b-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/e/e1959150-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e1959150-479c-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7465e9c2b6ffec9a33be020b877ad810dca0923 --- /dev/null +++ b/graph/incidents_graphml/e/e1959150-479c-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.185 + 100.64.18.185 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693444962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1959150-479c-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/e/e19b55d0-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e19b55d0-6b0b-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..930e932ca29694664203ac0523dc299e89c94d23 --- /dev/null +++ b/graph/incidents_graphml/e/e19b55d0-6b0b-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.238 + 100.64.66.238 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697340926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e19b55d0-6b0b-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/e/e19f3850-a812-11ee-99fc-3f84722b2bdf.graphml b/graph/incidents_graphml/e/e19f3850-a812-11ee-99fc-3f84722b2bdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5eef833aaf38d62976ea2382d5c7f85a1b41f686 --- /dev/null +++ b/graph/incidents_graphml/e/e19f3850-a812-11ee-99fc-3f84722b2bdf.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.244 + 100.64.68.244 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.29.127 + 100.64.29.127 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","Protect"] + + + INCIDENT_LINK + 1704050954 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e19f3850-a812-11ee-99fc-3f84722b2bdf + + + INCIDENT_LINK + 1704050954 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e19f3850-a812-11ee-99fc-3f84722b2bdf + + + INCIDENT_LINK + 1704050954 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e19f3850-a812-11ee-99fc-3f84722b2bdf + + + INCIDENT_LINK + 1704050954 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e19f3850-a812-11ee-99fc-3f84722b2bdf + + + diff --git a/graph/incidents_graphml/e/e1b20890-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e1b20890-6fe1-11ee-ab93-b9aa077096ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a216347c4eb0208574c4acb89cbd3111505b90da --- /dev/null +++ b/graph/incidents_graphml/e/e1b20890-6fe1-11ee-ab93-b9aa077096ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.37 + 100.64.17.37 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697872644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e1b20890-6fe1-11ee-ab93-b9aa077096ae + + + diff --git a/graph/incidents_graphml/e/e1b23810-36e8-11ee-94ff-9304c987561c.graphml b/graph/incidents_graphml/e/e1b23810-36e8-11ee-94ff-9304c987561c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c90827d7022fc75f900e10aee1cbec109d9544da --- /dev/null +++ b/graph/incidents_graphml/e/e1b23810-36e8-11ee-94ff-9304c987561c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.85 + 100.64.29.85 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691608434 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e1b23810-36e8-11ee-94ff-9304c987561c + + + diff --git a/graph/incidents_graphml/e/e1b3c7b0-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e1b3c7b0-479c-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b87e44b67b08064978d6cfd4a71a3ef59ecbcf59 --- /dev/null +++ b/graph/incidents_graphml/e/e1b3c7b0-479c-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.208 + 100.64.51.208 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693444962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1b3c7b0-479c-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693444962 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1b3c7b0-479c-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/e/e1bf80d0-63d2-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/e/e1bf80d0-63d2-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b32bbda536ddcdee13e8987c40e5fd397d72bcf --- /dev/null +++ b/graph/incidents_graphml/e/e1bf80d0-63d2-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.151 + 100.64.46.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696546787 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1bf80d0-63d2-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/e/e1c17960-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e1c17960-0cae-11ee-9176-191794f15128.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39c127da79d233e22becc1919d5922d985b408d3 --- /dev/null +++ b/graph/incidents_graphml/e/e1c17960-0cae-11ee-9176-191794f15128.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.214 + 100.64.10.214 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.39 + USER-0015-1768.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.238 + 100.64.77.238 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.153 + 100.64.72.153 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686965574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1c17960-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1c17960-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1c17960-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1c17960-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1c17960-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965574 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1c17960-0cae-11ee-9176-191794f15128 + + + diff --git a/graph/incidents_graphml/e/e1c26db0-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e1c26db0-479c-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86080029216801e8479154f6b64f92b2be43336a --- /dev/null +++ b/graph/incidents_graphml/e/e1c26db0-479c-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.208 + 100.64.51.208 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693444962 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e1c26db0-479c-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/e/e1c6a200-6fe1-11ee-ab93-b9aa077096ae.graphml b/graph/incidents_graphml/e/e1c6a200-6fe1-11ee-ab93-b9aa077096ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ae529f2b6a04380d198a53a3c00d86a39a63f80 --- /dev/null +++ b/graph/incidents_graphml/e/e1c6a200-6fe1-11ee-ab93-b9aa077096ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.37 + 100.64.17.37 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697872644 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1c6a200-6fe1-11ee-ab93-b9aa077096ae + + + diff --git a/graph/incidents_graphml/e/e1d070c0-63d2-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/e/e1d070c0-63d2-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44a6faca1dcf164fd083b24dba0e2277630de9a1 --- /dev/null +++ b/graph/incidents_graphml/e/e1d070c0-63d2-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.151 + 100.64.46.151 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696546787 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e1d070c0-63d2-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/e/e1db6b40-3a67-11ee-a671-291bdda64afb.graphml b/graph/incidents_graphml/e/e1db6b40-3a67-11ee-a671-291bdda64afb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2aff903969d72635b7ee1b035c595bf904ae589 --- /dev/null +++ b/graph/incidents_graphml/e/e1db6b40-3a67-11ee-a671-291bdda64afb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.89 + 100.64.7.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691992834 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e1db6b40-3a67-11ee-a671-291bdda64afb + + + diff --git a/graph/incidents_graphml/e/e1e7c030-3007-11ee-bc80-5d173594d7c4.graphml b/graph/incidents_graphml/e/e1e7c030-3007-11ee-bc80-5d173594d7c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2cfb6af4513ac2ebe92417fbadb5326d507ef4a4 --- /dev/null +++ b/graph/incidents_graphml/e/e1e7c030-3007-11ee-bc80-5d173594d7c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.70 + 100.64.80.70 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690852090 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1e7c030-3007-11ee-bc80-5d173594d7c4 + + + diff --git a/graph/incidents_graphml/e/e1e87540-13f4-11ee-9bb8-6b8312f57fd1.graphml b/graph/incidents_graphml/e/e1e87540-13f4-11ee-9bb8-6b8312f57fd1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e8ebc2f93c85142a1331b086cd7ada939b7804e --- /dev/null +++ b/graph/incidents_graphml/e/e1e87540-13f4-11ee-9bb8-6b8312f57fd1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.229 + 100.64.72.229 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.230 + 100.64.72.230 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687765297 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e1e87540-13f4-11ee-9bb8-6b8312f57fd1 + + + INCIDENT_LINK + 1687765297 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e1e87540-13f4-11ee-9bb8-6b8312f57fd1 + + + diff --git a/graph/incidents_graphml/e/e1ea3040-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/e/e1ea3040-3b83-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e36c90b31bb2e419dcc8066c753eab0abc293ac6 --- /dev/null +++ b/graph/incidents_graphml/e/e1ea3040-3b83-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.165 + 100.64.19.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692114811 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1ea3040-3b83-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/e/e1f48dc0-05a8-11ef-8a49-f14dcee941df.graphml b/graph/incidents_graphml/e/e1f48dc0-05a8-11ef-8a49-f14dcee941df.graphml new file mode 100644 index 0000000000000000000000000000000000000000..89540b269c8d323d345abdb35d222add3339f9e8 --- /dev/null +++ b/graph/incidents_graphml/e/e1f48dc0-05a8-11ef-8a49-f14dcee941df.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.20.181.243 + 172.20.181.243 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.92.99 + 100.64.92.99 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714340837 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e1f48dc0-05a8-11ef-8a49-f14dcee941df + + + INCIDENT_LINK + 1714340837 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e1f48dc0-05a8-11ef-8a49-f14dcee941df + + + diff --git a/graph/incidents_graphml/e/e1fbeb90-3a67-11ee-a671-291bdda64afb.graphml b/graph/incidents_graphml/e/e1fbeb90-3a67-11ee-a671-291bdda64afb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce94ecec1880498fae2a1c94d3aea7b316748ee2 --- /dev/null +++ b/graph/incidents_graphml/e/e1fbeb90-3a67-11ee-a671-291bdda64afb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.89 + 100.64.7.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691992834 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e1fbeb90-3a67-11ee-a671-291bdda64afb + + + diff --git a/graph/incidents_graphml/e/e1fbfef0-f0fb-11ee-aef3-7fbaf9d61c41.graphml b/graph/incidents_graphml/e/e1fbfef0-f0fb-11ee-aef3-7fbaf9d61c41.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5694ea6f68e64b05b429317f83a2fbf350d7adc9 --- /dev/null +++ b/graph/incidents_graphml/e/e1fbfef0-f0fb-11ee-aef3-7fbaf9d61c41.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.172 + 100.64.25.172 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712067511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e1fbfef0-f0fb-11ee-aef3-7fbaf9d61c41 + + + diff --git a/graph/incidents_graphml/e/e207d630-9c29-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/e/e207d630-9c29-11ed-a223-eb3483e385f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..beba68f8dccb47f04b5ce212c357b6909b5e39a6 --- /dev/null +++ b/graph/incidents_graphml/e/e207d630-9c29-11ed-a223-eb3483e385f1.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.132 + 100.64.72.132 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.133 + 100.64.72.133 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.134 + 100.64.72.134 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.136 + 100.64.72.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1674593921 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e207d630-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593921 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e207d630-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593921 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e207d630-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593921 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e207d630-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593921 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e207d630-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593921 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e207d630-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593921 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e207d630-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593921 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e207d630-9c29-11ed-a223-eb3483e385f1 + + + diff --git a/graph/incidents_graphml/e/e20cd460-3007-11ee-bc80-5d173594d7c4.graphml b/graph/incidents_graphml/e/e20cd460-3007-11ee-bc80-5d173594d7c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b578b90f893ca3567c77881bff3a21932d2f495e --- /dev/null +++ b/graph/incidents_graphml/e/e20cd460-3007-11ee-bc80-5d173594d7c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.70 + 100.64.80.70 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690852091 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e20cd460-3007-11ee-bc80-5d173594d7c4 + + + diff --git a/graph/incidents_graphml/e/e213f7f0-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e213f7f0-2da4-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9421869595f528bef0e2e76cd0280a3c98030df8 --- /dev/null +++ b/graph/incidents_graphml/e/e213f7f0-2da4-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.175 + 100.64.37.175 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690589668 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e213f7f0-2da4-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/e/e2168d70-3e62-11ee-8974-9fabcbebe5d1.graphml b/graph/incidents_graphml/e/e2168d70-3e62-11ee-8974-9fabcbebe5d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..771bb63f4f7b502e25fc43bc48aaf4a0bf07f80c --- /dev/null +++ b/graph/incidents_graphml/e/e2168d70-3e62-11ee-8974-9fabcbebe5d1.graphml @@ -0,0 +1,777 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.189 + 100.64.18.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.24 + 100.64.56.24 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.25 + 100.64.56.25 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.26 + 100.64.56.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.27 + 100.64.56.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.133 + 100.64.16.133 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.28 + 100.64.56.28 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.29 + 100.64.56.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.30 + 100.64.56.30 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.252 + 100.64.23.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.41 + 100.64.20.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.228 + 100.64.14.228 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.3 + 100.64.50.3 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.105 + 100.64.11.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.31 + 100.64.56.31 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.10 + 100.64.6.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.115 + 100.64.29.115 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + INCIDENT_LINK + 1692430491 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2168d70-3e62-11ee-8974-9fabcbebe5d1 + + + diff --git a/graph/incidents_graphml/e/e2170ca0-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/e/e2170ca0-3b83-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5536f8f5d768b52f76d11a9d484ceafb0af63099 --- /dev/null +++ b/graph/incidents_graphml/e/e2170ca0-3b83-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.165 + 100.64.19.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692114811 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2170ca0-3b83-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/e/e2248ae0-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e2248ae0-479c-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..07b163afbe241d0cf0158253c5996eb8b24f4480 --- /dev/null +++ b/graph/incidents_graphml/e/e2248ae0-479c-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.170 + 100.64.17.170 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693444963 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2248ae0-479c-11ee-b585-ebe535390ebf + + + INCIDENT_LINK + 1693444963 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2248ae0-479c-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/e/e2273db0-3add-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/e/e2273db0-3add-11ee-a7d4-a597d065c4ef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f111438c097832dd31a857c672d5d0cdfda3cfd4 --- /dev/null +++ b/graph/incidents_graphml/e/e2273db0-3add-11ee-a7d4-a597d065c4ef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.229 + 100.64.55.229 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692043515 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2273db0-3add-11ee-a7d4-a597d065c4ef + + + diff --git a/graph/incidents_graphml/e/e232e2c0-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e232e2c0-479c-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1c04d3cb6d76123aeb5ed0f0b9951364a3a6d26 --- /dev/null +++ b/graph/incidents_graphml/e/e232e2c0-479c-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.170 + 100.64.17.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693444963 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e232e2c0-479c-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/e/e23326f0-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e23326f0-0cae-11ee-9176-191794f15128.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35398bbf87b79d3560834ea3ad9cf97789994ec4 --- /dev/null +++ b/graph/incidents_graphml/e/e23326f0-0cae-11ee-9176-191794f15128.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.239 + 100.64.77.239 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.17 + 100.64.77.17 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.12 + 100.64.10.12 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686965575 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e23326f0-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965575 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e23326f0-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965575 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e23326f0-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965575 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e23326f0-0cae-11ee-9176-191794f15128 + + + diff --git a/graph/incidents_graphml/e/e23db2f0-7464-11ee-9e0a-5d8c532e858b.graphml b/graph/incidents_graphml/e/e23db2f0-7464-11ee-9e0a-5d8c532e858b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3985e750266349313939944eb784c6c56ce5f1e --- /dev/null +++ b/graph/incidents_graphml/e/e23db2f0-7464-11ee-9e0a-5d8c532e858b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.102 + 100.64.16.102 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698368713 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e23db2f0-7464-11ee-9e0a-5d8c532e858b + + + diff --git a/graph/incidents_graphml/e/e2404780-258b-11ef-a290-c53279b5db02.graphml b/graph/incidents_graphml/e/e2404780-258b-11ef-a290-c53279b5db02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7608496b303328391600d60506f85b4bf2e0796b --- /dev/null +++ b/graph/incidents_graphml/e/e2404780-258b-11ef-a290-c53279b5db02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.106 + 100.64.2.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717846819 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2404780-258b-11ef-a290-c53279b5db02 + + + diff --git a/graph/incidents_graphml/e/e242dc00-3add-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/e/e242dc00-3add-11ee-a7d4-a597d065c4ef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8e63979211ae8b97fa606725d6b81bf8f3664a3 --- /dev/null +++ b/graph/incidents_graphml/e/e242dc00-3add-11ee-a7d4-a597d065c4ef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.229 + 100.64.55.229 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692043515 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e242dc00-3add-11ee-a7d4-a597d065c4ef + + + diff --git a/graph/incidents_graphml/e/e2442fb0-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e2442fb0-2da4-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ba14fc1acdba8d87bd8d5369c3241a22b2a5187 --- /dev/null +++ b/graph/incidents_graphml/e/e2442fb0-2da4-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.175 + 100.64.37.175 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690589669 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2442fb0-2da4-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/e/e24e7720-0cae-11ee-9176-191794f15128.graphml b/graph/incidents_graphml/e/e24e7720-0cae-11ee-9176-191794f15128.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4025573f25631db91c4e4f993deda30d140d164f --- /dev/null +++ b/graph/incidents_graphml/e/e24e7720-0cae-11ee-9176-191794f15128.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.83 + 100.64.11.83 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.159 + HOST-14709 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686965575 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e24e7720-0cae-11ee-9176-191794f15128 + + + INCIDENT_LINK + 1686965575 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e24e7720-0cae-11ee-9176-191794f15128 + + + diff --git a/graph/incidents_graphml/e/e24ff6f0-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/e/e24ff6f0-3b83-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c108a0774752b418712a2c742c095e08ce2fa1f --- /dev/null +++ b/graph/incidents_graphml/e/e24ff6f0-3b83-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.134 + USER-0015-1448.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692114812 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e24ff6f0-3b83-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/e/e2541da0-258b-11ef-a290-c53279b5db02.graphml b/graph/incidents_graphml/e/e2541da0-258b-11ef-a290-c53279b5db02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ab0d21faf46519385025e63e232127b029af1c0 --- /dev/null +++ b/graph/incidents_graphml/e/e2541da0-258b-11ef-a290-c53279b5db02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.106 + 100.64.2.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717846820 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2541da0-258b-11ef-a290-c53279b5db02 + + + diff --git a/graph/incidents_graphml/e/e25fdd30-36e8-11ee-94ff-9304c987561c.graphml b/graph/incidents_graphml/e/e25fdd30-36e8-11ee-94ff-9304c987561c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54f4a552910dea5ae319771fa7402ddb92da27d5 --- /dev/null +++ b/graph/incidents_graphml/e/e25fdd30-36e8-11ee-94ff-9304c987561c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.87 + 100.64.29.87 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691608435 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e25fdd30-36e8-11ee-94ff-9304c987561c + + + diff --git a/graph/incidents_graphml/e/e27ad3c0-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e27ad3c0-6973-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e4f1d7edb6af4f4c1ce77d5871bca1d71ddf37b --- /dev/null +++ b/graph/incidents_graphml/e/e27ad3c0-6973-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.146 + 100.64.30.146 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697165693 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e27ad3c0-6973-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/e/e27bf0b0-36e8-11ee-94ff-9304c987561c.graphml b/graph/incidents_graphml/e/e27bf0b0-36e8-11ee-94ff-9304c987561c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27edaaecb93950db04eed9611a9be21accb6931c --- /dev/null +++ b/graph/incidents_graphml/e/e27bf0b0-36e8-11ee-94ff-9304c987561c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.87 + 100.64.29.87 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691608435 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e27bf0b0-36e8-11ee-94ff-9304c987561c + + + diff --git a/graph/incidents_graphml/e/e27c6370-1814-11ef-a290-d5e92fd7ebc0.graphml b/graph/incidents_graphml/e/e27c6370-1814-11ef-a290-d5e92fd7ebc0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea68d40ecd2f91b9ea31c40a239234330db72bed --- /dev/null +++ b/graph/incidents_graphml/e/e27c6370-1814-11ef-a290-d5e92fd7ebc0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.87.123 + USER-0015-2001.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716366345 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e27c6370-1814-11ef-a290-d5e92fd7ebc0 + + + diff --git a/graph/incidents_graphml/e/e2825990-258b-11ef-a290-c53279b5db02.graphml b/graph/incidents_graphml/e/e2825990-258b-11ef-a290-c53279b5db02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..046b0b6f094a2f3e1ca64dd39662b1f4293acf74 --- /dev/null +++ b/graph/incidents_graphml/e/e2825990-258b-11ef-a290-c53279b5db02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.95 + 100.64.7.95 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717846820 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2825990-258b-11ef-a290-c53279b5db02 + + + diff --git a/graph/incidents_graphml/e/e2862a30-3a67-11ee-a671-291bdda64afb.graphml b/graph/incidents_graphml/e/e2862a30-3a67-11ee-a671-291bdda64afb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d01ab32e80bf15b7c9ac9c58fe5ccba5d1bf61f9 --- /dev/null +++ b/graph/incidents_graphml/e/e2862a30-3a67-11ee-a671-291bdda64afb.graphml @@ -0,0 +1,791 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.152 + 100.64.22.152 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.21 + 100.64.33.21 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.22 + USER-0015-1296.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.23 + 100.64.33.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.59 + 100.64.5.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.246 + 100.64.28.246 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.24 + USER-0015-1297.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.241 + 100.64.11.241 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.176 + 100.64.17.176 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.202 + 100.64.20.202 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.25 + 100.64.33.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.95 + 100.64.12.95 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.26 + 100.64.33.26 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.27 + 100.64.33.27 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.203 + 100.64.23.203 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + INCIDENT_LINK + 1691992835 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2862a30-3a67-11ee-a671-291bdda64afb + + + diff --git a/graph/incidents_graphml/e/e28da510-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e28da510-6b0b-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f919d317fb285688e5424efd25d51b317dffcfc --- /dev/null +++ b/graph/incidents_graphml/e/e28da510-6b0b-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.240 + 100.64.66.240 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697340928 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e28da510-6b0b-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/e/e290b170-258b-11ef-a290-c53279b5db02.graphml b/graph/incidents_graphml/e/e290b170-258b-11ef-a290-c53279b5db02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3a7eee8d20f07119279cfcdc71eb4ca44775127 --- /dev/null +++ b/graph/incidents_graphml/e/e290b170-258b-11ef-a290-c53279b5db02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.95 + 100.64.7.95 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717846820 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e290b170-258b-11ef-a290-c53279b5db02 + + + diff --git a/graph/incidents_graphml/e/e2937950-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e2937950-479c-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c9ff6e807dbca2f2f25c408207baa23a2cbb578 --- /dev/null +++ b/graph/incidents_graphml/e/e2937950-479c-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.210 + 100.64.51.210 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693444963 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2937950-479c-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/e/e2976e40-dd5f-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/e/e2976e40-dd5f-11ed-8595-d92cdedd1bfb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20da40904e63e9c91bcd708975fe3454f3ce8072 --- /dev/null +++ b/graph/incidents_graphml/e/e2976e40-dd5f-11ed-8595-d92cdedd1bfb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.58 + 100.64.73.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.77.6 + 100.64.77.6 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1681763941 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2976e40-dd5f-11ed-8595-d92cdedd1bfb + + + diff --git a/graph/incidents_graphml/e/e2a068e0-258b-11ef-a290-c53279b5db02.graphml b/graph/incidents_graphml/e/e2a068e0-258b-11ef-a290-c53279b5db02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edbedbd04ff94d9b736d37a8b1abd3ddd37c8449 --- /dev/null +++ b/graph/incidents_graphml/e/e2a068e0-258b-11ef-a290-c53279b5db02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.97 + 100.64.7.97 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717846820 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2a068e0-258b-11ef-a290-c53279b5db02 + + + diff --git a/graph/incidents_graphml/e/e2a1f840-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e2a1f840-479c-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52871c83103526fe2428ed8f5ceefe39b2ec664b --- /dev/null +++ b/graph/incidents_graphml/e/e2a1f840-479c-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.210 + 100.64.51.210 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693444963 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2a1f840-479c-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/e/e2a523e0-3a67-11ee-a671-291bdda64afb.graphml b/graph/incidents_graphml/e/e2a523e0-3a67-11ee-a671-291bdda64afb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..222f973e9c1028ef0112d12642fc5302a37fd87a --- /dev/null +++ b/graph/incidents_graphml/e/e2a523e0-3a67-11ee-a671-291bdda64afb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.152 + 100.64.22.152 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691992835 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e2a523e0-3a67-11ee-a671-291bdda64afb + + + diff --git a/graph/incidents_graphml/e/e2a907f0-2529-11ef-8cb9-83584de710c3.graphml b/graph/incidents_graphml/e/e2a907f0-2529-11ef-8cb9-83584de710c3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f41c570a973d80adfc814a98840b630a318034b --- /dev/null +++ b/graph/incidents_graphml/e/e2a907f0-2529-11ef-8cb9-83584de710c3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.112 + 100.64.65.112 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717804729 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e2a907f0-2529-11ef-8cb9-83584de710c3 + + + diff --git a/graph/incidents_graphml/e/e2aa9a10-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/e/e2aa9a10-3b83-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3abe8274e154a6a088bedf2f690c191e18146d37 --- /dev/null +++ b/graph/incidents_graphml/e/e2aa9a10-3b83-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.103 + 100.64.62.103 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692114812 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2aa9a10-3b83-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/e/e2afd230-258b-11ef-a290-c53279b5db02.graphml b/graph/incidents_graphml/e/e2afd230-258b-11ef-a290-c53279b5db02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66168f867cfc8f401381eed5f8c5c568bdaba409 --- /dev/null +++ b/graph/incidents_graphml/e/e2afd230-258b-11ef-a290-c53279b5db02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.97 + 100.64.7.97 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717846820 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2afd230-258b-11ef-a290-c53279b5db02 + + + diff --git a/graph/incidents_graphml/e/e2b11f80-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/e/e2b11f80-5ebe-11ee-b36b-27983c746e66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6286abb0134a0dd1f27b99e4ee9f3a657ee6d8e --- /dev/null +++ b/graph/incidents_graphml/e/e2b11f80-5ebe-11ee-b36b-27983c746e66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.125 + 100.64.38.125 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695988443 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2b11f80-5ebe-11ee-b36b-27983c746e66 + + + diff --git a/graph/incidents_graphml/e/e2b2a180-1601-11ee-b5b0-23eb7b8b596d.graphml b/graph/incidents_graphml/e/e2b2a180-1601-11ee-b5b0-23eb7b8b596d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..460faa334f2321b950a4bff09b653bb97b2871ad --- /dev/null +++ b/graph/incidents_graphml/e/e2b2a180-1601-11ee-b5b0-23eb7b8b596d.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.32 + 100.64.27.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.192 + 100.64.40.192 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.150 + 100.64.19.150 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687990785 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2b2a180-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990785 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2b2a180-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990785 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2b2a180-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990785 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2b2a180-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990785 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2b2a180-1601-11ee-b5b0-23eb7b8b596d + + + INCIDENT_LINK + 1687990785 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2b2a180-1601-11ee-b5b0-23eb7b8b596d + + + diff --git a/graph/incidents_graphml/e/e2b8e670-2529-11ef-8cb9-83584de710c3.graphml b/graph/incidents_graphml/e/e2b8e670-2529-11ef-8cb9-83584de710c3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7b60eb0a9845e50908486bc3f678df265d6d590 --- /dev/null +++ b/graph/incidents_graphml/e/e2b8e670-2529-11ef-8cb9-83584de710c3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.112 + 100.64.65.112 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717804730 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2b8e670-2529-11ef-8cb9-83584de710c3 + + + diff --git a/graph/incidents_graphml/e/e2c39610-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/e/e2c39610-5ebe-11ee-b36b-27983c746e66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9151805591b75672ba6a6351b4f07c5e88f5e79c --- /dev/null +++ b/graph/incidents_graphml/e/e2c39610-5ebe-11ee-b36b-27983c746e66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.125 + 100.64.38.125 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695988443 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2c39610-5ebe-11ee-b36b-27983c746e66 + + + diff --git a/graph/incidents_graphml/e/e2cecf60-7464-11ee-9e0a-5d8c532e858b.graphml b/graph/incidents_graphml/e/e2cecf60-7464-11ee-9e0a-5d8c532e858b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3355be611e87b5947d00f6ded76a8c5a4203372 --- /dev/null +++ b/graph/incidents_graphml/e/e2cecf60-7464-11ee-9e0a-5d8c532e858b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.104 + 100.64.16.104 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698368714 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e2cecf60-7464-11ee-9e0a-5d8c532e858b + + + diff --git a/graph/incidents_graphml/e/e2d3e9c0-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/e/e2d3e9c0-5ebe-11ee-b36b-27983c746e66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5dd5b573a279d77e85fa73bbfc444c015e6e526 --- /dev/null +++ b/graph/incidents_graphml/e/e2d3e9c0-5ebe-11ee-b36b-27983c746e66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.76 + 100.64.7.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695988443 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2d3e9c0-5ebe-11ee-b36b-27983c746e66 + + + diff --git a/graph/incidents_graphml/e/e2d8a780-2da4-11ee-a72a-b3e5c322bb35.graphml b/graph/incidents_graphml/e/e2d8a780-2da4-11ee-a72a-b3e5c322bb35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b15073afa94084a9b3085c1cef8f77dadf07ff1 --- /dev/null +++ b/graph/incidents_graphml/e/e2d8a780-2da4-11ee-a72a-b3e5c322bb35.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.177 + 100.64.37.177 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690589670 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2d8a780-2da4-11ee-a72a-b3e5c322bb35 + + + diff --git a/graph/incidents_graphml/e/e2d9c060-3b83-11ee-a154-fb63c9fd96ca.graphml b/graph/incidents_graphml/e/e2d9c060-3b83-11ee-a154-fb63c9fd96ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..60f19c49dcc61631b77c4aaafc64f0923a208ed0 --- /dev/null +++ b/graph/incidents_graphml/e/e2d9c060-3b83-11ee-a154-fb63c9fd96ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.103 + 100.64.62.103 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692114812 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2d9c060-3b83-11ee-a154-fb63c9fd96ca + + + diff --git a/graph/incidents_graphml/e/e2daf520-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e2daf520-6973-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ca5e7c3e33c1a30f24b65181f146fa6a4873c9e --- /dev/null +++ b/graph/incidents_graphml/e/e2daf520-6973-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.87 + 100.64.13.87 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2daf520-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2daf520-6973-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/e/e2db4e80-5e3e-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/e/e2db4e80-5e3e-11ed-95e5-b5536252f217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b66e31627ef02d710100d84134b5085443c3f2db --- /dev/null +++ b/graph/incidents_graphml/e/e2db4e80-5e3e-11ed-95e5-b5536252f217.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.29 + 100.64.78.29 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.85 + 100.64.71.85 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.46.131 + 100.64.46.131 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.254 + 100.64.71.254 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.72.88 + 100.64.72.88 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.74.15 + 100.64.74.15 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.228 + 100.64.71.228 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.73.104 + 100.64.73.104 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667785970 + malicious + 0.7626953125 + 0.7626953125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e2db4e80-5e3e-11ed-95e5-b5536252f217 + + + diff --git a/graph/incidents_graphml/e/e2e145f0-7464-11ee-9e0a-5d8c532e858b.graphml b/graph/incidents_graphml/e/e2e145f0-7464-11ee-9e0a-5d8c532e858b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..daf9223d1a5c31f09e0c39e2413cf72f7a23679a --- /dev/null +++ b/graph/incidents_graphml/e/e2e145f0-7464-11ee-9e0a-5d8c532e858b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.105 + 100.64.16.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698368714 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e2e145f0-7464-11ee-9e0a-5d8c532e858b + + + diff --git a/graph/incidents_graphml/e/e2e35310-5ebe-11ee-b36b-27983c746e66.graphml b/graph/incidents_graphml/e/e2e35310-5ebe-11ee-b36b-27983c746e66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..47c34d113bed6942c61f439cad6dbe8bf52a6f7e --- /dev/null +++ b/graph/incidents_graphml/e/e2e35310-5ebe-11ee-b36b-27983c746e66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.76 + 100.64.7.76 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695988443 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2e35310-5ebe-11ee-b36b-27983c746e66 + + + diff --git a/graph/incidents_graphml/e/e2e43250-60bf-11ee-8be9-71423a8fe595.graphml b/graph/incidents_graphml/e/e2e43250-60bf-11ee-8be9-71423a8fe595.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca940835506686d1ca0810f24c64433850a4d40b --- /dev/null +++ b/graph/incidents_graphml/e/e2e43250-60bf-11ee-8be9-71423a8fe595.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.82 + 100.64.54.82 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696208775 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2e43250-60bf-11ee-8be9-71423a8fe595 + + + diff --git a/graph/incidents_graphml/e/e2e5ae60-9674-11ee-ab9f-854a086fd880.graphml b/graph/incidents_graphml/e/e2e5ae60-9674-11ee-ab9f-854a086fd880.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2614c98f7345ab5db2f64b6d9e495c5837758cdb --- /dev/null +++ b/graph/incidents_graphml/e/e2e5ae60-9674-11ee-ab9f-854a086fd880.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.43 + 100.64.62.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.23 + 100.64.28.23 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.44 + 100.64.62.44 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.45 + 100.64.62.45 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702113926 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2e5ae60-9674-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702113926 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2e5ae60-9674-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702113926 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2e5ae60-9674-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702113926 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2e5ae60-9674-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702113926 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2e5ae60-9674-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702113926 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2e5ae60-9674-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702113926 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2e5ae60-9674-11ee-ab9f-854a086fd880 + + + INCIDENT_LINK + 1702113926 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2e5ae60-9674-11ee-ab9f-854a086fd880 + + + diff --git a/graph/incidents_graphml/e/e2f39ba0-60bf-11ee-8be9-71423a8fe595.graphml b/graph/incidents_graphml/e/e2f39ba0-60bf-11ee-8be9-71423a8fe595.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c783cc889f7a54737a0f948627fe7109e26b865 --- /dev/null +++ b/graph/incidents_graphml/e/e2f39ba0-60bf-11ee-8be9-71423a8fe595.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.82 + 100.64.54.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696208775 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2f39ba0-60bf-11ee-8be9-71423a8fe595 + + + diff --git a/graph/incidents_graphml/e/e2f95290-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e2f95290-6973-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5a9172852a07d9ab18a570a3452336c6de54b40 --- /dev/null +++ b/graph/incidents_graphml/e/e2f95290-6973-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.87 + 100.64.13.87 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697165694 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e2f95290-6973-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/e/e2ffa8a0-479c-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/e/e2ffa8a0-479c-11ee-b585-ebe535390ebf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..665d9af667b4a30a0a00959052e7a4acd514241f --- /dev/null +++ b/graph/incidents_graphml/e/e2ffa8a0-479c-11ee-b585-ebe535390ebf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.236 + 100.64.37.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693444964 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e2ffa8a0-479c-11ee-b585-ebe535390ebf + + + diff --git a/graph/incidents_graphml/e/e306c010-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e306c010-6973-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9dc0aa8592f9211ad2f545791a2ad0ac0254d5e7 --- /dev/null +++ b/graph/incidents_graphml/e/e306c010-6973-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,417 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.34 + 100.64.51.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.22 + 100.64.16.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.169 + 100.64.19.169 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.35 + 100.64.51.35 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.210 + 100.64.29.210 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.36 + 100.64.51.36 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.38 + 100.64.32.38 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.250 + 100.64.36.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.37 + 100.64.51.37 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.38 + 100.64.51.38 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.191 + 100.64.9.191 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + INCIDENT_LINK + 1697165694 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e306c010-6973-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/e/e308a2a0-097d-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/e/e308a2a0-097d-11ee-8b37-9ba18759a170.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b180072d4a52c1f1d0284693c433a8a21c99d7df --- /dev/null +++ b/graph/incidents_graphml/e/e308a2a0-097d-11ee-8b37-9ba18759a170.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.163 + 100.64.14.163 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1686614677 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e308a2a0-097d-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614677 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e308a2a0-097d-11ee-8b37-9ba18759a170 + + + diff --git a/graph/incidents_graphml/e/e30f3120-6b0b-11ee-a565-4f025efe2b34.graphml b/graph/incidents_graphml/e/e30f3120-6b0b-11ee-a565-4f025efe2b34.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9910389b497601ff3552f6a13309067a55014ed --- /dev/null +++ b/graph/incidents_graphml/e/e30f3120-6b0b-11ee-a565-4f025efe2b34.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.129 + 100.64.9.129 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697340929 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e30f3120-6b0b-11ee-a565-4f025efe2b34 + + + diff --git a/graph/incidents_graphml/e/e31517f0-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e31517f0-6973-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfdf2e38da6f7f6d8049c249a19e76467a84743d --- /dev/null +++ b/graph/incidents_graphml/e/e31517f0-6973-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.34 + 100.64.51.34 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697165694 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e31517f0-6973-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/e/e319fea0-3007-11ee-bc80-5d173594d7c4.graphml b/graph/incidents_graphml/e/e319fea0-3007-11ee-bc80-5d173594d7c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b1722dc489d0129fbc9ddad2bf5bd01cad0b067a --- /dev/null +++ b/graph/incidents_graphml/e/e319fea0-3007-11ee-bc80-5d173594d7c4.graphml @@ -0,0 +1,121 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.173 + 100.64.12.173 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.118 + 100.64.72.118 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.11.151 + 100.64.11.151 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.82 + 100.64.73.82 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690852093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e319fea0-3007-11ee-bc80-5d173594d7c4 + + + INCIDENT_LINK + 1690852093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e319fea0-3007-11ee-bc80-5d173594d7c4 + + + INCIDENT_LINK + 1690852093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e319fea0-3007-11ee-bc80-5d173594d7c4 + + + INCIDENT_LINK + 1690852093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e319fea0-3007-11ee-bc80-5d173594d7c4 + + + diff --git a/graph/incidents_graphml/e/e31d2910-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/e/e31d2910-6232-11ee-a972-e59ec7ee05b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9cdb2383e90ab533062103a220149ed3937399fc --- /dev/null +++ b/graph/incidents_graphml/e/e31d2910-6232-11ee-a972-e59ec7ee05b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.252 + 100.64.13.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696368119 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e31d2910-6232-11ee-a972-e59ec7ee05b9 + + + diff --git a/graph/incidents_graphml/e/e3319b70-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/e/e3319b70-6232-11ee-a972-e59ec7ee05b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fa2a9a7091e706799d59ef22d163cd8c2bd218d --- /dev/null +++ b/graph/incidents_graphml/e/e3319b70-6232-11ee-a972-e59ec7ee05b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.252 + 100.64.13.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696368119 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e3319b70-6232-11ee-a972-e59ec7ee05b9 + + + diff --git a/graph/incidents_graphml/e/e334bbb0-63d2-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/e/e334bbb0-63d2-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0eede6ca8f6e6a31ed5f0d02ac0c26ed763ffab1 --- /dev/null +++ b/graph/incidents_graphml/e/e334bbb0-63d2-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.180 + 100.64.67.180 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696546790 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e334bbb0-63d2-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/e/e339c330-54c8-11ee-83d2-a73a71ba6c5b.graphml b/graph/incidents_graphml/e/e339c330-54c8-11ee-83d2-a73a71ba6c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b7c5fec7fc4b69e8a2372bf02333b0169eca375 --- /dev/null +++ b/graph/incidents_graphml/e/e339c330-54c8-11ee-83d2-a73a71ba6c5b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.47 + 100.64.34.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694893227 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e339c330-54c8-11ee-83d2-a73a71ba6c5b + + + diff --git a/graph/incidents_graphml/e/e33be960-9c29-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/e/e33be960-9c29-11ed-a223-eb3483e385f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5b7e310b4f0603f4a49755bba1f304a8db9c95e --- /dev/null +++ b/graph/incidents_graphml/e/e33be960-9c29-11ed-a223-eb3483e385f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.137 + 100.64.72.137 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.138 + 100.64.72.138 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1674593923 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e33be960-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593923 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e33be960-9c29-11ed-a223-eb3483e385f1 + + + diff --git a/graph/incidents_graphml/e/e33d8450-299c-11ed-a614-6fadee11a89c.graphml b/graph/incidents_graphml/e/e33d8450-299c-11ed-a614-6fadee11a89c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65e77a07a9a5e89a8fec02b31d2c22dc5cd1c2fc --- /dev/null +++ b/graph/incidents_graphml/e/e33d8450-299c-11ed-a614-6fadee11a89c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.153 + 100.64.9.153 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661998932 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e33d8450-299c-11ed-a614-6fadee11a89c + + + diff --git a/graph/incidents_graphml/e/e3422930-63d2-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/e/e3422930-63d2-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3701d601640e193225a988651ca9ef546ef5041b --- /dev/null +++ b/graph/incidents_graphml/e/e3422930-63d2-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.180 + 100.64.67.180 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696546790 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e3422930-63d2-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/e/e34c2970-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/e/e34c2970-43ac-11ef-a622-2be670a61274.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a42929ed7ceb65e765eea057ded9918728e5211e --- /dev/null +++ b/graph/incidents_graphml/e/e34c2970-43ac-11ef-a622-2be670a61274.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.2 + 100.64.38.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.3 + 100.64.38.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721159530 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e34c2970-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159530 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e34c2970-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159530 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e34c2970-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159530 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e34c2970-43ac-11ef-a622-2be670a61274 + + + diff --git a/graph/incidents_graphml/e/e350f640-63d2-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/e/e350f640-63d2-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c5c4da71bad4eaa55a080bcd039af5647e15ca0 --- /dev/null +++ b/graph/incidents_graphml/e/e350f640-63d2-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.181 + 100.64.67.181 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696546790 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e350f640-63d2-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/e/e35cabf0-fa5c-11ed-b0cc-bb4b118b8ff6.graphml b/graph/incidents_graphml/e/e35cabf0-fa5c-11ed-b0cc-bb4b118b8ff6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e7ad70f939b254f7e017a6965aaa6dbf3be336e --- /dev/null +++ b/graph/incidents_graphml/e/e35cabf0-fa5c-11ed-b0cc-bb4b118b8ff6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.225 + 100.64.70.225 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + 0.6625 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","Azure Security","Advanced Malware Protection (AMP)"] + + + INCIDENT_LINK + 1684951237 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + e35cabf0-fa5c-11ed-b0cc-bb4b118b8ff6 + + + diff --git a/graph/incidents_graphml/e/e35e3cb0-63d2-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/e/e35e3cb0-63d2-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a423f3da6f091c6d7668ef1ca3eff32b23ceff25 --- /dev/null +++ b/graph/incidents_graphml/e/e35e3cb0-63d2-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.181 + 100.64.67.181 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696546790 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e35e3cb0-63d2-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/e/e35fe8d0-54c8-11ee-83d2-a73a71ba6c5b.graphml b/graph/incidents_graphml/e/e35fe8d0-54c8-11ee-83d2-a73a71ba6c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6604443d67fbae13dd73f6293726a4704f33e5be --- /dev/null +++ b/graph/incidents_graphml/e/e35fe8d0-54c8-11ee-83d2-a73a71ba6c5b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.49 + 100.64.34.49 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694893228 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e35fe8d0-54c8-11ee-83d2-a73a71ba6c5b + + + diff --git a/graph/incidents_graphml/e/e3622680-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e3622680-6973-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0601d5e4833a7c1abaad6a18eacdd37ec3ecc5a --- /dev/null +++ b/graph/incidents_graphml/e/e3622680-6973-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.35 + 100.64.25.35 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697165695 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e3622680-6973-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/e/e36fc750-54c8-11ee-83d2-a73a71ba6c5b.graphml b/graph/incidents_graphml/e/e36fc750-54c8-11ee-83d2-a73a71ba6c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f51fcb39872743cfc28c520020b1b9242efb7e5 --- /dev/null +++ b/graph/incidents_graphml/e/e36fc750-54c8-11ee-83d2-a73a71ba6c5b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.49 + 100.64.34.49 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694893228 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e36fc750-54c8-11ee-83d2-a73a71ba6c5b + + + diff --git a/graph/incidents_graphml/e/e372c850-6973-11ee-99bd-0777ff256373.graphml b/graph/incidents_graphml/e/e372c850-6973-11ee-99bd-0777ff256373.graphml new file mode 100644 index 0000000000000000000000000000000000000000..048618c1214034eb578362fe37836926e0631a44 --- /dev/null +++ b/graph/incidents_graphml/e/e372c850-6973-11ee-99bd-0777ff256373.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.35 + 100.64.25.35 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697165695 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e372c850-6973-11ee-99bd-0777ff256373 + + + diff --git a/graph/incidents_graphml/e/e3815910-dd5f-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/e/e3815910-dd5f-11ed-8595-d92cdedd1bfb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ceb5684a5e8a561f7c8bb96316e13f1f3140a63c --- /dev/null +++ b/graph/incidents_graphml/e/e3815910-dd5f-11ed-8595-d92cdedd1bfb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.148 + 100.64.80.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681763942 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e3815910-dd5f-11ed-8595-d92cdedd1bfb + + + diff --git a/graph/incidents_graphml/e/e3833b00-0676-11ee-8a7a-dfec82f23e60.graphml b/graph/incidents_graphml/e/e3833b00-0676-11ee-8a7a-dfec82f23e60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12440b4ed58ce7046ea234750de2cf3e3380c7bd --- /dev/null +++ b/graph/incidents_graphml/e/e3833b00-0676-11ee-8a7a-dfec82f23e60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.56 + 100.64.57.56 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686281819 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e3833b00-0676-11ee-8a7a-dfec82f23e60 + + + diff --git a/graph/incidents_graphml/e/e38550b0-dd5f-11ed-8595-d92cdedd1bfb.graphml b/graph/incidents_graphml/e/e38550b0-dd5f-11ed-8595-d92cdedd1bfb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b03ac53c5b46e2e6e04cfacc05d41dcf46e1f107 --- /dev/null +++ b/graph/incidents_graphml/e/e38550b0-dd5f-11ed-8595-d92cdedd1bfb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.80.148 + 100.64.80.148 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681763942 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e38550b0-dd5f-11ed-8595-d92cdedd1bfb + + + diff --git a/graph/incidents_graphml/e/e38c0b10-60bf-11ee-8be9-71423a8fe595.graphml b/graph/incidents_graphml/e/e38c0b10-60bf-11ee-8be9-71423a8fe595.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88527b32f15aa246ace661a9e152ac07b4ba4b65 --- /dev/null +++ b/graph/incidents_graphml/e/e38c0b10-60bf-11ee-8be9-71423a8fe595.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.211 + 100.64.23.211 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696208776 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e38c0b10-60bf-11ee-8be9-71423a8fe595 + + + diff --git a/graph/incidents_graphml/e/e39b2640-60bf-11ee-8be9-71423a8fe595.graphml b/graph/incidents_graphml/e/e39b2640-60bf-11ee-8be9-71423a8fe595.graphml new file mode 100644 index 0000000000000000000000000000000000000000..403d1d7f66631f159a960535995bf475ac265a84 --- /dev/null +++ b/graph/incidents_graphml/e/e39b2640-60bf-11ee-8be9-71423a8fe595.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.211 + 100.64.23.211 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696208776 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e39b2640-60bf-11ee-8be9-71423a8fe595 + + + diff --git a/graph/incidents_graphml/e/e39f74a0-53dd-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/e/e39f74a0-53dd-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb0bc876ef01cbaad8ce7d1fd4d982abf6cbefd2 --- /dev/null +++ b/graph/incidents_graphml/e/e39f74a0-53dd-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.157 + 100.64.14.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694792296 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e39f74a0-53dd-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/e/e3a7e6c0-3007-11ee-bc80-5d173594d7c4.graphml b/graph/incidents_graphml/e/e3a7e6c0-3007-11ee-bc80-5d173594d7c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b32f4bb7e99b22b34d05661f06bdf5ad7b78977 --- /dev/null +++ b/graph/incidents_graphml/e/e3a7e6c0-3007-11ee-bc80-5d173594d7c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.72 + 100.64.80.72 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690852093 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e3a7e6c0-3007-11ee-bc80-5d173594d7c4 + + + diff --git a/graph/incidents_graphml/e/e3a9aec0-0676-11ee-8a7a-dfec82f23e60.graphml b/graph/incidents_graphml/e/e3a9aec0-0676-11ee-8a7a-dfec82f23e60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7709ca331779a230cf8be1b4ffebedf6d734905b --- /dev/null +++ b/graph/incidents_graphml/e/e3a9aec0-0676-11ee-8a7a-dfec82f23e60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.56 + 100.64.57.56 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686281819 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e3a9aec0-0676-11ee-8a7a-dfec82f23e60 + + + diff --git a/graph/incidents_graphml/e/e3b297e0-1a8c-11ee-a9ef-735ae64b5bd4.graphml b/graph/incidents_graphml/e/e3b297e0-1a8c-11ee-a9ef-735ae64b5bd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48936581db22654f213f71c5af7387be8df9499f --- /dev/null +++ b/graph/incidents_graphml/e/e3b297e0-1a8c-11ee-a9ef-735ae64b5bd4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.128.62 + 192.168.128.62 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.0.105 + 100.64.0.105 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688490291 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e3b297e0-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490291 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e3b297e0-1a8c-11ee-a9ef-735ae64b5bd4 + + + diff --git a/graph/incidents_graphml/e/e3b2d590-53dd-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/e/e3b2d590-53dd-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca3a51a07ee20e3c6c5bf47998aca971333e3554 --- /dev/null +++ b/graph/incidents_graphml/e/e3b2d590-53dd-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.157 + 100.64.14.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694792296 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e3b2d590-53dd-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/e/e3b50db0-54c8-11ee-83d2-a73a71ba6c5b.graphml b/graph/incidents_graphml/e/e3b50db0-54c8-11ee-83d2-a73a71ba6c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..539741343460ff80cc0505cb66529830c914f26c --- /dev/null +++ b/graph/incidents_graphml/e/e3b50db0-54c8-11ee-83d2-a73a71ba6c5b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.51 + 100.64.34.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694893228 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e3b50db0-54c8-11ee-83d2-a73a71ba6c5b + + + diff --git a/graph/incidents_graphml/e/e3c3c580-53dd-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/e/e3c3c580-53dd-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ddf9b73786b839dd34035d6e421ac0021863356 --- /dev/null +++ b/graph/incidents_graphml/e/e3c3c580-53dd-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.157 + 100.64.14.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694792296 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e3c3c580-53dd-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/e/e3c53a50-54c8-11ee-83d2-a73a71ba6c5b.graphml b/graph/incidents_graphml/e/e3c53a50-54c8-11ee-83d2-a73a71ba6c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d45b882d668999870492ce473c448b7823b5d692 --- /dev/null +++ b/graph/incidents_graphml/e/e3c53a50-54c8-11ee-83d2-a73a71ba6c5b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.53 + 100.64.34.53 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694893228 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e3c53a50-54c8-11ee-83d2-a73a71ba6c5b + + + diff --git a/graph/incidents_graphml/e/e3c559d0-3007-11ee-bc80-5d173594d7c4.graphml b/graph/incidents_graphml/e/e3c559d0-3007-11ee-bc80-5d173594d7c4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c42f5515f6d6345cb9eef0db6172a194cf2c15dc --- /dev/null +++ b/graph/incidents_graphml/e/e3c559d0-3007-11ee-bc80-5d173594d7c4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.72 + 100.64.80.72 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690852094 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e3c559d0-3007-11ee-bc80-5d173594d7c4 + + + diff --git a/graph/incidents_graphml/e/e3d47c90-54c8-11ee-83d2-a73a71ba6c5b.graphml b/graph/incidents_graphml/e/e3d47c90-54c8-11ee-83d2-a73a71ba6c5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58dc87b519c8691a25c565488fa44b53edd2560d --- /dev/null +++ b/graph/incidents_graphml/e/e3d47c90-54c8-11ee-83d2-a73a71ba6c5b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.53 + 100.64.34.53 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694893228 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e3d47c90-54c8-11ee-83d2-a73a71ba6c5b + + + diff --git a/graph/incidents_graphml/e/e3d4b570-53dd-11ee-b407-311666e984f5.graphml b/graph/incidents_graphml/e/e3d4b570-53dd-11ee-b407-311666e984f5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7bfc66f0933c68cf5e06bf2cd44e4b19a3afdc9 --- /dev/null +++ b/graph/incidents_graphml/e/e3d4b570-53dd-11ee-b407-311666e984f5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.157 + 100.64.14.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694792297 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + e3d4b570-53dd-11ee-b407-311666e984f5 + + + diff --git a/graph/incidents_graphml/e/e3d7acd0-3add-11ee-a7d4-a597d065c4ef.graphml b/graph/incidents_graphml/e/e3d7acd0-3add-11ee-a7d4-a597d065c4ef.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b4057227fd83ac28d186b4184d37b9ea5a33ade1 --- /dev/null +++ b/graph/incidents_graphml/e/e3d7acd0-3add-11ee-a7d4-a597d065c4ef.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.149 + 100.64.21.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692043518 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e3d7acd0-3add-11ee-a7d4-a597d065c4ef + + + diff --git a/graph/incidents_graphml/e/e3d85220-9b05-11ed-8216-d3cecd9ec3aa.graphml b/graph/incidents_graphml/e/e3d85220-9b05-11ed-8216-d3cecd9ec3aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d189feb86042863d20f29e5bd7377092721f6718 --- /dev/null +++ b/graph/incidents_graphml/e/e3d85220-9b05-11ed-8216-d3cecd9ec3aa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.189 + 100.64.55.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + USER-0015-1968.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1674468511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + e3d85220-9b05-11ed-8216-d3cecd9ec3aa + + + diff --git a/graph/incidents_graphml/e/e3d961e0-9c29-11ed-a223-eb3483e385f1.graphml b/graph/incidents_graphml/e/e3d961e0-9c29-11ed-a223-eb3483e385f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2396f284b9e031bcadc9583a93174223809cddb7 --- /dev/null +++ b/graph/incidents_graphml/e/e3d961e0-9c29-11ed-a223-eb3483e385f1.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.68 + 100.64.20.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.51 + 100.64.1.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.139 + 100.64.72.139 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1674593924 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e3d961e0-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593924 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e3d961e0-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593924 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e3d961e0-9c29-11ed-a223-eb3483e385f1 + + + INCIDENT_LINK + 1674593924 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + e3d961e0-9c29-11ed-a223-eb3483e385f1 + + + diff --git a/graph/incidents_graphml/e/e3dafe10-68c5-11ee-988d-f7248eee7e4c.graphml b/graph/incidents_graphml/e/e3dafe10-68c5-11ee-988d-f7248eee7e4c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27a1bd2424dd8a125d1c452c08a9de517144c0cc --- /dev/null +++ b/graph/incidents_graphml/e/e3dafe10-68c5-11ee-988d-f7248eee7e4c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.197 + 100.64.43.197 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697090963 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e3dafe10-68c5-11ee-988d-f7248eee7e4c + + + diff --git a/graph/incidents_graphml/e/e3db8670-9b05-11ed-8216-d3cecd9ec3aa.graphml b/graph/incidents_graphml/e/e3db8670-9b05-11ed-8216-d3cecd9ec3aa.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b8be4aa5f19dcc296c3871cd4d441b0b45fd4d1 --- /dev/null +++ b/graph/incidents_graphml/e/e3db8670-9b05-11ed-8216-d3cecd9ec3aa.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1968.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.55.189 + 100.64.55.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1674468511 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + e3db8670-9b05-11ed-8216-d3cecd9ec3aa + + +