f15hb0wn commited on
Commit
339cde1
·
verified ·
1 Parent(s): d563eb0

Upload per-incident GraphML sharded batch 7/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/3/3da99d90-2b9d-11ee-a75c-6705ed43e196.graphml +63 -0
  2. graph/incidents_graphml/3/3daaa090-fdf5-11ec-a66d-037b7a1a7f6a.graphml +63 -0
  3. graph/incidents_graphml/3/3dab9a60-0482-11ee-9300-094b5588de47.graphml +63 -0
  4. graph/incidents_graphml/3/3db2b6e0-fdf5-11ec-a66d-037b7a1a7f6a.graphml +63 -0
  5. graph/incidents_graphml/3/3dbe8620-0482-11ee-9300-094b5588de47.graphml +63 -0
  6. graph/incidents_graphml/3/3dc1db80-e560-11ee-be14-8bb84b2c14a8.graphml +77 -0
  7. graph/incidents_graphml/3/3dc34570-21ec-11ee-86db-6b99d218dc75.graphml +63 -0
  8. graph/incidents_graphml/3/3dc401b0-90da-11ee-ac7c-5360e2814c47.graphml +63 -0
  9. graph/incidents_graphml/3/3dc46700-94e4-11ee-b216-b792b1d50feb.graphml +329 -0
  10. graph/incidents_graphml/3/3dcc0050-fe5c-11ee-894d-f3eebee8c21c.graphml +63 -0
  11. graph/incidents_graphml/3/3dd01250-0482-11ee-9300-094b5588de47.graphml +63 -0
  12. graph/incidents_graphml/3/3dd04610-fe5c-11ee-894d-f3eebee8c21c.graphml +63 -0
  13. graph/incidents_graphml/3/3dd19640-90da-11ee-ac7c-5360e2814c47.graphml +63 -0
  14. graph/incidents_graphml/3/3ddc92c0-90da-11ee-ac7c-5360e2814c47.graphml +63 -0
  15. graph/incidents_graphml/3/3ddf0c60-0c57-11ee-a19d-25527a25a69c.graphml +63 -0
  16. graph/incidents_graphml/3/3ddfc780-4e75-11ee-8a68-d180c8de201c.graphml +63 -0
  17. graph/incidents_graphml/3/3de60b50-0482-11ee-9300-094b5588de47.graphml +63 -0
  18. graph/incidents_graphml/3/3de76830-90da-11ee-ac7c-5360e2814c47.graphml +63 -0
  19. graph/incidents_graphml/3/3df08610-0761-11ef-b3ae-bbe9f432e5f6.graphml +257 -0
  20. graph/incidents_graphml/3/3df39d30-90da-11ee-ac7c-5360e2814c47.graphml +63 -0
  21. graph/incidents_graphml/3/3df410a0-3655-11ef-872b-bfba974a2ef0.graphml +63 -0
  22. graph/incidents_graphml/3/3dfacad0-2b9d-11ee-a75c-6705ed43e196.graphml +85 -0
  23. graph/incidents_graphml/3/3dfe99b0-90da-11ee-ac7c-5360e2814c47.graphml +63 -0
  24. graph/incidents_graphml/3/3dffec80-fdf5-11ec-a66d-037b7a1a7f6a.graphml +63 -0
  25. graph/incidents_graphml/3/3e007710-0c57-11ee-a19d-25527a25a69c.graphml +63 -0
  26. graph/incidents_graphml/3/3e02b6a0-3655-11ef-872b-bfba974a2ef0.graphml +63 -0
  27. graph/incidents_graphml/3/3e0845f0-2f9b-11ee-812f-67af952e62fd.graphml +77 -0
  28. graph/incidents_graphml/3/3e1025e0-90da-11ee-ac7c-5360e2814c47.graphml +85 -0
  29. graph/incidents_graphml/3/3e11d1d0-3655-11ef-872b-bfba974a2ef0.graphml +63 -0
  30. graph/incidents_graphml/3/3e14fc20-7ac6-11ee-a3e7-4d4a8f436180.graphml +149 -0
  31. graph/incidents_graphml/3/3e182a60-5e80-11ee-b169-95f488d76cb0.graphml +63 -0
  32. graph/incidents_graphml/3/3e1ca900-90da-11ee-ac7c-5360e2814c47.graphml +63 -0
  33. graph/incidents_graphml/3/3e201960-ace6-11ed-9c58-3fd78e20bcce.graphml +63 -0
  34. graph/incidents_graphml/3/3e209ee0-3655-11ef-872b-bfba974a2ef0.graphml +63 -0
  35. graph/incidents_graphml/3/3e22b550-7afd-11ed-bc1d-99c452878324.graphml +63 -0
  36. graph/incidents_graphml/3/3e24d450-ace6-11ed-9c58-3fd78e20bcce.graphml +63 -0
  37. graph/incidents_graphml/3/3e26bda0-74ab-11ee-861f-33fd57670a9d.graphml +63 -0
  38. graph/incidents_graphml/3/3e273050-90da-11ee-ac7c-5360e2814c47.graphml +63 -0
  39. graph/incidents_graphml/3/3e279370-ace6-11ed-9c58-3fd78e20bcce.graphml +63 -0
  40. graph/incidents_graphml/3/3e291a50-5e80-11ee-b169-95f488d76cb0.graphml +63 -0
  41. graph/incidents_graphml/3/3e2ec180-589f-11ee-a130-b3fc4de2b604.graphml +63 -0
  42. graph/incidents_graphml/3/3e305490-21eb-11ee-a8c2-a10defe0b4b5.graphml +259 -0
  43. graph/incidents_graphml/3/3e367510-74ab-11ee-861f-33fd57670a9d.graphml +63 -0
  44. graph/incidents_graphml/3/3e3b6bb0-589f-11ee-a130-b3fc4de2b604.graphml +63 -0
  45. graph/incidents_graphml/3/3e3d9fd0-5e3f-11ed-95e5-b5536252f217.graphml +77 -0
  46. graph/incidents_graphml/3/3e3ebbf0-0745-11ed-9d26-9564153a7999.graphml +279 -0
  47. graph/incidents_graphml/3/3e4090b0-0745-11ed-9d26-9564153a7999.graphml +149 -0
  48. graph/incidents_graphml/3/3e451b10-74ab-11ee-861f-33fd57670a9d.graphml +63 -0
  49. graph/incidents_graphml/3/3e4bd6d0-fcd3-11ed-af18-a9f44b259145.graphml +63 -0
  50. graph/incidents_graphml/3/3e4d3400-fc46-11ec-b1da-11e6c916d75e.graphml +149 -0
graph/incidents_graphml/3/3da99d90-2b9d-11ee-a75c-6705ed43e196.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.174.172</data>
35
+ <data key="n_hostname">172.30.174.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="88c04553-0626-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.6.153</data>
43
+ <data key="n_hostname">100.64.6.153</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2946" target="HOST-2840">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690366484</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3da99d90-2b9d-11ee-a75c-6705ed43e196</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3daaa090-fdf5-11ec-a66d-037b7a1a7f6a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e3769640-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.81.27</data>
35
+ <data key="n_hostname">USER-0015-1855.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.227</data>
43
+ <data key="n_hostname">100.64.70.227</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="e3769640-ea91-11ec-90c7-eff83c975df3" target="HOST-12604">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1657199028</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3daaa090-fdf5-11ec-a66d-037b7a1a7f6a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3dab9a60-0482-11ee-9300-094b5588de47.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b64d35b1-c822-11ed-93e7-73b4f1774f3f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.18.38.152</data>
35
+ <data key="n_hostname">172.18.38.152</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="21dee156-c87f-11ed-8288-5d6a2ca59eaf">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.22.195</data>
43
+ <data key="n_hostname">100.64.22.195</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2973" target="HOST-10246">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686066792</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3dab9a60-0482-11ee-9300-094b5588de47</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3db2b6e0-fdf5-11ec-a66d-037b7a1a7f6a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="e3769640-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.81.27</data>
43
+ <data key="n_hostname">USER-0015-1855.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12604" target="HOST-15891">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1657199028</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3db2b6e0-fdf5-11ec-a66d-037b7a1a7f6a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3dbe8620-0482-11ee-9300-094b5588de47.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fa708d0-c876-11ed-9255-21e1269e0ade">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.60.113</data>
35
+ <data key="n_hostname">100.64.60.113</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="3ef8d9a1-c823-11ed-a57f-1bec2f3cbc08">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.174.172</data>
43
+ <data key="n_hostname">172.30.174.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="1fa708d0-c876-11ed-9255-21e1269e0ade" target="HOST-2975">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686066792</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3dbe8620-0482-11ee-9300-094b5588de47</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3dc1db80-e560-11ee-be14-8bb84b2c14a8.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="af44ad21-e19e-11ee-a714-0b8cb255d7de">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.91</data>
35
+ <data key="n_hostname">100.64.68.91</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.325</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="bfbd5639-0624-11ee-bb59-61e1854d46e6">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.19</data>
43
+ <data key="n_hostname">100.64.68.19</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Protect","CASB"]</data>
47
+ </node>
48
+ <edge id="e1" source="af44ad21-e19e-11ee-a714-0b8cb255d7de" target="HOST-11388">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710791201</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.6625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3dc1db80-e560-11ee-be14-8bb84b2c14a8</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-11388" target="af44ad21-e19e-11ee-a714-0b8cb255d7de">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1710791201</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.6625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">3dc1db80-e560-11ee-be14-8bb84b2c14a8</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/3/3dc34570-21ec-11ee-86db-6b99d218dc75.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.208.219</data>
35
+ <data key="n_hostname">172.30.208.219</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="76333fc2-0629-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.10.207</data>
43
+ <data key="n_hostname">USER-0015-1237.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2823" target="HOST-4865">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1689300902</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3dc34570-21ec-11ee-86db-6b99d218dc75</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3dc401b0-90da-11ee-ac7c-5360e2814c47.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.208.219</data>
35
+ <data key="n_hostname">172.30.208.219</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a9bfa5e0-18e9-11ee-b9c6-01dce6a1cf2a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.27.109</data>
43
+ <data key="n_hostname">100.64.27.109</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2823" target="a9bfa5e0-18e9-11ee-b9c6-01dce6a1cf2a">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701497750</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3dc401b0-90da-11ee-ac7c-5360e2814c47</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3dc46700-94e4-11ee-b216-b792b1d50feb.graphml ADDED
@@ -0,0 +1,329 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.40.149</data>
35
+ <data key="n_hostname">172.29.40.149</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="6f1fee92-062e-11ee-842a-11e2c675c822">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.26.123</data>
43
+ <data key="n_hostname">100.64.26.123</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="88186a83-949a-11ee-9e11-176ad1351afe">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.26.124</data>
51
+ <data key="n_hostname">100.64.26.124</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="457bcfd0-0626-11ee-8794-6bae0a4a6dd8">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.10.46</data>
59
+ <data key="n_hostname">100.64.10.46</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="86148e31-0692-11ee-b8c6-fb2178062d63">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.26.125</data>
67
+ <data key="n_hostname">100.64.26.125</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="0f7acec2-06c3-11ee-b27e-cbc2ff83423c">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.26.126</data>
75
+ <data key="n_hostname">100.64.26.126</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="bb07e3d2-0b5b-11ee-86c0-4764ad967bd1">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.26.127</data>
83
+ <data key="n_hostname">100.64.26.127</data>
84
+ <data key="n_set_roles">["Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="556bd175-0625-11ee-8794-6bae0a4a6dd8">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.26.128</data>
91
+ <data key="n_hostname">100.64.26.128</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="325994a0-924e-11ee-b84d-63fcde73dbdf">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.26.129</data>
99
+ <data key="n_hostname">100.64.26.129</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <edge id="e1" source="HOST-2834" target="6f1fee92-062e-11ee-842a-11e2c675c822">
105
+ <data key="e_type">INCIDENT_LINK</data>
106
+ <data key="e_timestamp">1701941850</data>
107
+ <data key="e_label_binary">malicious</data>
108
+ <data key="e_label_confidence">0.7</data>
109
+ <data key="e_suspicion_score">0.25</data>
110
+ <data key="e_mo_name">Data Theft</data>
111
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
112
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
113
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
114
+ <data key="e_lifecycle_stage">complete-mission</data>
115
+ <data key="e_disposition">Unprocessed</data>
116
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
117
+ </edge>
118
+ <edge id="e2" source="6f1fee92-062e-11ee-842a-11e2c675c822" target="HOST-2834">
119
+ <data key="e_type">INCIDENT_LINK</data>
120
+ <data key="e_timestamp">1701941850</data>
121
+ <data key="e_label_binary">malicious</data>
122
+ <data key="e_label_confidence">0.7</data>
123
+ <data key="e_suspicion_score">0.25</data>
124
+ <data key="e_mo_name">Data Theft</data>
125
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
126
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
127
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
128
+ <data key="e_lifecycle_stage">complete-mission</data>
129
+ <data key="e_disposition">Unprocessed</data>
130
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
131
+ </edge>
132
+ <edge id="e3" source="88186a83-949a-11ee-9e11-176ad1351afe" target="HOST-2834">
133
+ <data key="e_type">INCIDENT_LINK</data>
134
+ <data key="e_timestamp">1701941850</data>
135
+ <data key="e_label_binary">malicious</data>
136
+ <data key="e_label_confidence">0.7</data>
137
+ <data key="e_suspicion_score">0.25</data>
138
+ <data key="e_mo_name">Data Theft</data>
139
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
140
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
141
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
142
+ <data key="e_lifecycle_stage">complete-mission</data>
143
+ <data key="e_disposition">Unprocessed</data>
144
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
145
+ </edge>
146
+ <edge id="e4" source="HOST-2834" target="88186a83-949a-11ee-9e11-176ad1351afe">
147
+ <data key="e_type">INCIDENT_LINK</data>
148
+ <data key="e_timestamp">1701941850</data>
149
+ <data key="e_label_binary">malicious</data>
150
+ <data key="e_label_confidence">0.7</data>
151
+ <data key="e_suspicion_score">0.25</data>
152
+ <data key="e_mo_name">Data Theft</data>
153
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
154
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
155
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
156
+ <data key="e_lifecycle_stage">complete-mission</data>
157
+ <data key="e_disposition">Unprocessed</data>
158
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
159
+ </edge>
160
+ <edge id="e5" source="HOST-2834" target="HOST-3134">
161
+ <data key="e_type">INCIDENT_LINK</data>
162
+ <data key="e_timestamp">1701941850</data>
163
+ <data key="e_label_binary">malicious</data>
164
+ <data key="e_label_confidence">0.7</data>
165
+ <data key="e_suspicion_score">0.25</data>
166
+ <data key="e_mo_name">Data Theft</data>
167
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
168
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
169
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
170
+ <data key="e_lifecycle_stage">complete-mission</data>
171
+ <data key="e_disposition">Unprocessed</data>
172
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
173
+ </edge>
174
+ <edge id="e6" source="HOST-3134" target="HOST-2834">
175
+ <data key="e_type">INCIDENT_LINK</data>
176
+ <data key="e_timestamp">1701941850</data>
177
+ <data key="e_label_binary">malicious</data>
178
+ <data key="e_label_confidence">0.7</data>
179
+ <data key="e_suspicion_score">0.25</data>
180
+ <data key="e_mo_name">Data Theft</data>
181
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
182
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
183
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
184
+ <data key="e_lifecycle_stage">complete-mission</data>
185
+ <data key="e_disposition">Unprocessed</data>
186
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
187
+ </edge>
188
+ <edge id="e7" source="86148e31-0692-11ee-b8c6-fb2178062d63" target="HOST-2834">
189
+ <data key="e_type">INCIDENT_LINK</data>
190
+ <data key="e_timestamp">1701941850</data>
191
+ <data key="e_label_binary">malicious</data>
192
+ <data key="e_label_confidence">0.7</data>
193
+ <data key="e_suspicion_score">0.25</data>
194
+ <data key="e_mo_name">Data Theft</data>
195
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
196
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
197
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
198
+ <data key="e_lifecycle_stage">complete-mission</data>
199
+ <data key="e_disposition">Unprocessed</data>
200
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
201
+ </edge>
202
+ <edge id="e8" source="HOST-2834" target="86148e31-0692-11ee-b8c6-fb2178062d63">
203
+ <data key="e_type">INCIDENT_LINK</data>
204
+ <data key="e_timestamp">1701941850</data>
205
+ <data key="e_label_binary">malicious</data>
206
+ <data key="e_label_confidence">0.7</data>
207
+ <data key="e_suspicion_score">0.25</data>
208
+ <data key="e_mo_name">Data Theft</data>
209
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
210
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
211
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
212
+ <data key="e_lifecycle_stage">complete-mission</data>
213
+ <data key="e_disposition">Unprocessed</data>
214
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
215
+ </edge>
216
+ <edge id="e9" source="HOST-2834" target="0f7acec2-06c3-11ee-b27e-cbc2ff83423c">
217
+ <data key="e_type">INCIDENT_LINK</data>
218
+ <data key="e_timestamp">1701941850</data>
219
+ <data key="e_label_binary">malicious</data>
220
+ <data key="e_label_confidence">0.7</data>
221
+ <data key="e_suspicion_score">0.25</data>
222
+ <data key="e_mo_name">Data Theft</data>
223
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
224
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
225
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
226
+ <data key="e_lifecycle_stage">complete-mission</data>
227
+ <data key="e_disposition">Unprocessed</data>
228
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
229
+ </edge>
230
+ <edge id="e10" source="0f7acec2-06c3-11ee-b27e-cbc2ff83423c" target="HOST-2834">
231
+ <data key="e_type">INCIDENT_LINK</data>
232
+ <data key="e_timestamp">1701941850</data>
233
+ <data key="e_label_binary">malicious</data>
234
+ <data key="e_label_confidence">0.7</data>
235
+ <data key="e_suspicion_score">0.25</data>
236
+ <data key="e_mo_name">Data Theft</data>
237
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
238
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
239
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
240
+ <data key="e_lifecycle_stage">complete-mission</data>
241
+ <data key="e_disposition">Unprocessed</data>
242
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
243
+ </edge>
244
+ <edge id="e11" source="bb07e3d2-0b5b-11ee-86c0-4764ad967bd1" target="HOST-2834">
245
+ <data key="e_type">INCIDENT_LINK</data>
246
+ <data key="e_timestamp">1701941850</data>
247
+ <data key="e_label_binary">malicious</data>
248
+ <data key="e_label_confidence">0.7</data>
249
+ <data key="e_suspicion_score">0.25</data>
250
+ <data key="e_mo_name">Data Theft</data>
251
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
252
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
253
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
254
+ <data key="e_lifecycle_stage">complete-mission</data>
255
+ <data key="e_disposition">Unprocessed</data>
256
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
257
+ </edge>
258
+ <edge id="e12" source="HOST-2834" target="bb07e3d2-0b5b-11ee-86c0-4764ad967bd1">
259
+ <data key="e_type">INCIDENT_LINK</data>
260
+ <data key="e_timestamp">1701941850</data>
261
+ <data key="e_label_binary">malicious</data>
262
+ <data key="e_label_confidence">0.7</data>
263
+ <data key="e_suspicion_score">0.25</data>
264
+ <data key="e_mo_name">Data Theft</data>
265
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
266
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
267
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
268
+ <data key="e_lifecycle_stage">complete-mission</data>
269
+ <data key="e_disposition">Unprocessed</data>
270
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
271
+ </edge>
272
+ <edge id="e13" source="HOST-2834" target="556bd175-0625-11ee-8794-6bae0a4a6dd8">
273
+ <data key="e_type">INCIDENT_LINK</data>
274
+ <data key="e_timestamp">1701941850</data>
275
+ <data key="e_label_binary">malicious</data>
276
+ <data key="e_label_confidence">0.7</data>
277
+ <data key="e_suspicion_score">0.25</data>
278
+ <data key="e_mo_name">Data Theft</data>
279
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
280
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
281
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
282
+ <data key="e_lifecycle_stage">complete-mission</data>
283
+ <data key="e_disposition">Unprocessed</data>
284
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
285
+ </edge>
286
+ <edge id="e14" source="556bd175-0625-11ee-8794-6bae0a4a6dd8" target="HOST-2834">
287
+ <data key="e_type">INCIDENT_LINK</data>
288
+ <data key="e_timestamp">1701941850</data>
289
+ <data key="e_label_binary">malicious</data>
290
+ <data key="e_label_confidence">0.7</data>
291
+ <data key="e_suspicion_score">0.25</data>
292
+ <data key="e_mo_name">Data Theft</data>
293
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
294
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
295
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
296
+ <data key="e_lifecycle_stage">complete-mission</data>
297
+ <data key="e_disposition">Unprocessed</data>
298
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
299
+ </edge>
300
+ <edge id="e15" source="325994a0-924e-11ee-b84d-63fcde73dbdf" target="HOST-2834">
301
+ <data key="e_type">INCIDENT_LINK</data>
302
+ <data key="e_timestamp">1701941850</data>
303
+ <data key="e_label_binary">malicious</data>
304
+ <data key="e_label_confidence">0.7</data>
305
+ <data key="e_suspicion_score">0.25</data>
306
+ <data key="e_mo_name">Data Theft</data>
307
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
308
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
309
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
310
+ <data key="e_lifecycle_stage">complete-mission</data>
311
+ <data key="e_disposition">Unprocessed</data>
312
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
313
+ </edge>
314
+ <edge id="e16" source="HOST-2834" target="325994a0-924e-11ee-b84d-63fcde73dbdf">
315
+ <data key="e_type">INCIDENT_LINK</data>
316
+ <data key="e_timestamp">1701941850</data>
317
+ <data key="e_label_binary">malicious</data>
318
+ <data key="e_label_confidence">0.7</data>
319
+ <data key="e_suspicion_score">0.25</data>
320
+ <data key="e_mo_name">Data Theft</data>
321
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
322
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
323
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
324
+ <data key="e_lifecycle_stage">complete-mission</data>
325
+ <data key="e_disposition">Unprocessed</data>
326
+ <data key="e_incident_id">3dc46700-94e4-11ee-b216-b792b1d50feb</data>
327
+ </edge>
328
+ </graph>
329
+ </graphml>
graph/incidents_graphml/3/3dcc0050-fe5c-11ee-894d-f3eebee8c21c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1cea11cc-f62c-11ee-8937-a3a4358261b8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.69.174</data>
35
+ <data key="n_hostname">100.64.69.174</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.325</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="094cdc22-0626-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.45</data>
43
+ <data key="n_hostname">100.64.68.45</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.6625</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","Protect","CASB"]</data>
47
+ </node>
48
+ <edge id="e1" source="1cea11cc-f62c-11ee-8937-a3a4358261b8" target="HOST-11424">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713538262</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.6625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3dcc0050-fe5c-11ee-894d-f3eebee8c21c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3dd01250-0482-11ee-9300-094b5588de47.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3ef8d9a1-c823-11ed-a57f-1bec2f3cbc08">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.174.172</data>
35
+ <data key="n_hostname">172.30.174.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="1fa708d0-c876-11ed-9255-21e1269e0ade">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.60.113</data>
43
+ <data key="n_hostname">100.64.60.113</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2975" target="HOST-10247">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686066792</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3dd01250-0482-11ee-9300-094b5588de47</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3dd04610-fe5c-11ee-894d-f3eebee8c21c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="094cdc22-0626-11ee-9f36-61ae8743c399">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.45</data>
35
+ <data key="n_hostname">100.64.68.45</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","Protect","CASB"]</data>
39
+ </node>
40
+ <node id="1cea11cc-f62c-11ee-8937-a3a4358261b8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.69.174</data>
43
+ <data key="n_hostname">100.64.69.174</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11424" target="HOST-12172">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1713538262</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3dd04610-fe5c-11ee-894d-f3eebee8c21c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3dd19640-90da-11ee-ac7c-5360e2814c47.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8c73f488-460e-11ee-bf45-ffa0da231a5c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.27.111</data>
35
+ <data key="n_hostname">100.64.27.111</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b87ac569-062e-11ee-9194-85f5dad80b4e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.40.149</data>
43
+ <data key="n_hostname">172.29.40.149</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="8c73f488-460e-11ee-bf45-ffa0da231a5c" target="HOST-2834">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701497751</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3dd19640-90da-11ee-ac7c-5360e2814c47</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3ddc92c0-90da-11ee-ac7c-5360e2814c47.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="69ec2d40-2d0b-11ee-9c7f-516f06026cb8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.27.113</data>
35
+ <data key="n_hostname">100.64.27.113</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.214.148</data>
43
+ <data key="n_hostname">172.30.214.148</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="69ec2d40-2d0b-11ee-9c7f-516f06026cb8" target="HOST-2720">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701497751</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3ddc92c0-90da-11ee-ac7c-5360e2814c47</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3ddf0c60-0c57-11ee-a19d-25527a25a69c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7db35a82-063a-11ee-a222-3304f3c625a8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.23.203</data>
35
+ <data key="n_hostname">100.64.23.203</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.200.243</data>
43
+ <data key="n_hostname">172.30.200.243</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-5455" target="HOST-2706">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686927933</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3ddf0c60-0c57-11ee-a19d-25527a25a69c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3ddfc780-4e75-11ee-8a68-d180c8de201c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.1.127</data>
35
+ <data key="n_hostname">172.29.1.127</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f78e144-0625-11ee-b144-2b760827f5b0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.29.194</data>
43
+ <data key="n_hostname">100.64.29.194</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2713" target="HOST-5851">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1694197595</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3ddfc780-4e75-11ee-8a68-d180c8de201c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3de60b50-0482-11ee-9300-094b5588de47.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="dbc66b10-d441-11ed-85d3-51d4b74bafc9">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.28.243</data>
35
+ <data key="n_hostname">100.64.28.243</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b64ce792-c822-11ed-93e7-73b4f1774f3f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-8614" target="HOST-2735">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686066792</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3de60b50-0482-11ee-9300-094b5588de47</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3de76830-90da-11ee-ac7c-5360e2814c47.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.214.148</data>
35
+ <data key="n_hostname">172.30.214.148</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="69ec2d40-2d0b-11ee-9c7f-516f06026cb8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.27.113</data>
43
+ <data key="n_hostname">100.64.27.113</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2720" target="HOST-5504">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701497751</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3de76830-90da-11ee-ac7c-5360e2814c47</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3df08610-0761-11ef-b3ae-bbe9f432e5f6.graphml ADDED
@@ -0,0 +1,257 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="4ead2ef4-0635-11ee-877a-6de6b73825b2">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.2.126</data>
35
+ <data key="n_hostname">100.64.2.126</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.217.8</data>
43
+ <data key="n_hostname">172.24.217.8</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="36a0f9a2-0625-11ee-ad3e-fda0da874cab">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.51.152</data>
51
+ <data key="n_hostname">100.64.51.152</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="6fbd3df1-0761-11ef-935c-eda5d9a8eca0">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.51.153</data>
59
+ <data key="n_hostname">100.64.51.153</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.578125</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="d2d13142-088d-11ee-b3f7-b52a3d05998c">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.6.129</data>
67
+ <data key="n_hostname">100.64.6.129</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.9746875</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="66970bd0-e929-11ee-8daf-eda5a9e12ce0">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.47.85</data>
75
+ <data key="n_hostname">100.64.47.85</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.7890625</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="65262b35-ebf1-11ee-b79c-950ab9016fb2">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.3.112</data>
83
+ <data key="n_hostname">100.64.3.112</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <edge id="e1" source="HOST-8249" target="HOST-2731">
89
+ <data key="e_type">INCIDENT_LINK</data>
90
+ <data key="e_timestamp">1714529970</data>
91
+ <data key="e_label_binary">malicious</data>
92
+ <data key="e_label_confidence">0.9746875</data>
93
+ <data key="e_suspicion_score">0.9746875</data>
94
+ <data key="e_mo_name">Data Theft</data>
95
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
96
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
97
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
98
+ <data key="e_lifecycle_stage">complete-mission</data>
99
+ <data key="e_disposition">Disrupted</data>
100
+ <data key="e_incident_id">3df08610-0761-11ef-b3ae-bbe9f432e5f6</data>
101
+ </edge>
102
+ <edge id="e2" source="HOST-2731" target="HOST-8249">
103
+ <data key="e_type">INCIDENT_LINK</data>
104
+ <data key="e_timestamp">1714529970</data>
105
+ <data key="e_label_binary">malicious</data>
106
+ <data key="e_label_confidence">0.9746875</data>
107
+ <data key="e_suspicion_score">0.9746875</data>
108
+ <data key="e_mo_name">Data Theft</data>
109
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
110
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
111
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
112
+ <data key="e_lifecycle_stage">complete-mission</data>
113
+ <data key="e_disposition">Disrupted</data>
114
+ <data key="e_incident_id">3df08610-0761-11ef-b3ae-bbe9f432e5f6</data>
115
+ </edge>
116
+ <edge id="e3" source="36a0f9a2-0625-11ee-ad3e-fda0da874cab" target="HOST-2731">
117
+ <data key="e_type">INCIDENT_LINK</data>
118
+ <data key="e_timestamp">1714529970</data>
119
+ <data key="e_label_binary">malicious</data>
120
+ <data key="e_label_confidence">0.9746875</data>
121
+ <data key="e_suspicion_score">0.9746875</data>
122
+ <data key="e_mo_name">Data Theft</data>
123
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
124
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
125
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
126
+ <data key="e_lifecycle_stage">complete-mission</data>
127
+ <data key="e_disposition">Disrupted</data>
128
+ <data key="e_incident_id">3df08610-0761-11ef-b3ae-bbe9f432e5f6</data>
129
+ </edge>
130
+ <edge id="e4" source="HOST-2731" target="36a0f9a2-0625-11ee-ad3e-fda0da874cab">
131
+ <data key="e_type">INCIDENT_LINK</data>
132
+ <data key="e_timestamp">1714529970</data>
133
+ <data key="e_label_binary">malicious</data>
134
+ <data key="e_label_confidence">0.9746875</data>
135
+ <data key="e_suspicion_score">0.9746875</data>
136
+ <data key="e_mo_name">Data Theft</data>
137
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
138
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
139
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
140
+ <data key="e_lifecycle_stage">complete-mission</data>
141
+ <data key="e_disposition">Disrupted</data>
142
+ <data key="e_incident_id">3df08610-0761-11ef-b3ae-bbe9f432e5f6</data>
143
+ </edge>
144
+ <edge id="e5" source="6fbd3df1-0761-11ef-935c-eda5d9a8eca0" target="HOST-2731">
145
+ <data key="e_type">INCIDENT_LINK</data>
146
+ <data key="e_timestamp">1714529970</data>
147
+ <data key="e_label_binary">malicious</data>
148
+ <data key="e_label_confidence">0.9746875</data>
149
+ <data key="e_suspicion_score">0.9746875</data>
150
+ <data key="e_mo_name">Data Theft</data>
151
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
152
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
153
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
154
+ <data key="e_lifecycle_stage">complete-mission</data>
155
+ <data key="e_disposition">Disrupted</data>
156
+ <data key="e_incident_id">3df08610-0761-11ef-b3ae-bbe9f432e5f6</data>
157
+ </edge>
158
+ <edge id="e6" source="HOST-2731" target="6fbd3df1-0761-11ef-935c-eda5d9a8eca0">
159
+ <data key="e_type">INCIDENT_LINK</data>
160
+ <data key="e_timestamp">1714529970</data>
161
+ <data key="e_label_binary">malicious</data>
162
+ <data key="e_label_confidence">0.9746875</data>
163
+ <data key="e_suspicion_score">0.9746875</data>
164
+ <data key="e_mo_name">Data Theft</data>
165
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
166
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
167
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
168
+ <data key="e_lifecycle_stage">complete-mission</data>
169
+ <data key="e_disposition">Disrupted</data>
170
+ <data key="e_incident_id">3df08610-0761-11ef-b3ae-bbe9f432e5f6</data>
171
+ </edge>
172
+ <edge id="e7" source="HOST-7353" target="HOST-2731">
173
+ <data key="e_type">INCIDENT_LINK</data>
174
+ <data key="e_timestamp">1714529970</data>
175
+ <data key="e_label_binary">malicious</data>
176
+ <data key="e_label_confidence">0.9746875</data>
177
+ <data key="e_suspicion_score">0.9746875</data>
178
+ <data key="e_mo_name">Data Theft</data>
179
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
180
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
181
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
182
+ <data key="e_lifecycle_stage">complete-mission</data>
183
+ <data key="e_disposition">Disrupted</data>
184
+ <data key="e_incident_id">3df08610-0761-11ef-b3ae-bbe9f432e5f6</data>
185
+ </edge>
186
+ <edge id="e8" source="HOST-2731" target="HOST-7353">
187
+ <data key="e_type">INCIDENT_LINK</data>
188
+ <data key="e_timestamp">1714529970</data>
189
+ <data key="e_label_binary">malicious</data>
190
+ <data key="e_label_confidence">0.9746875</data>
191
+ <data key="e_suspicion_score">0.9746875</data>
192
+ <data key="e_mo_name">Data Theft</data>
193
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
194
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
195
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
196
+ <data key="e_lifecycle_stage">complete-mission</data>
197
+ <data key="e_disposition">Disrupted</data>
198
+ <data key="e_incident_id">3df08610-0761-11ef-b3ae-bbe9f432e5f6</data>
199
+ </edge>
200
+ <edge id="e9" source="66970bd0-e929-11ee-8daf-eda5a9e12ce0" target="HOST-2731">
201
+ <data key="e_type">INCIDENT_LINK</data>
202
+ <data key="e_timestamp">1714529970</data>
203
+ <data key="e_label_binary">malicious</data>
204
+ <data key="e_label_confidence">0.9746875</data>
205
+ <data key="e_suspicion_score">0.9746875</data>
206
+ <data key="e_mo_name">Data Theft</data>
207
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
208
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
209
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
210
+ <data key="e_lifecycle_stage">complete-mission</data>
211
+ <data key="e_disposition">Disrupted</data>
212
+ <data key="e_incident_id">3df08610-0761-11ef-b3ae-bbe9f432e5f6</data>
213
+ </edge>
214
+ <edge id="e10" source="HOST-2731" target="66970bd0-e929-11ee-8daf-eda5a9e12ce0">
215
+ <data key="e_type">INCIDENT_LINK</data>
216
+ <data key="e_timestamp">1714529970</data>
217
+ <data key="e_label_binary">malicious</data>
218
+ <data key="e_label_confidence">0.9746875</data>
219
+ <data key="e_suspicion_score">0.9746875</data>
220
+ <data key="e_mo_name">Data Theft</data>
221
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
222
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
223
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
224
+ <data key="e_lifecycle_stage">complete-mission</data>
225
+ <data key="e_disposition">Disrupted</data>
226
+ <data key="e_incident_id">3df08610-0761-11ef-b3ae-bbe9f432e5f6</data>
227
+ </edge>
228
+ <edge id="e11" source="65262b35-ebf1-11ee-b79c-950ab9016fb2" target="HOST-2731">
229
+ <data key="e_type">INCIDENT_LINK</data>
230
+ <data key="e_timestamp">1714529970</data>
231
+ <data key="e_label_binary">malicious</data>
232
+ <data key="e_label_confidence">0.9746875</data>
233
+ <data key="e_suspicion_score">0.9746875</data>
234
+ <data key="e_mo_name">Data Theft</data>
235
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
236
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
237
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
238
+ <data key="e_lifecycle_stage">complete-mission</data>
239
+ <data key="e_disposition">Disrupted</data>
240
+ <data key="e_incident_id">3df08610-0761-11ef-b3ae-bbe9f432e5f6</data>
241
+ </edge>
242
+ <edge id="e12" source="HOST-2731" target="65262b35-ebf1-11ee-b79c-950ab9016fb2">
243
+ <data key="e_type">INCIDENT_LINK</data>
244
+ <data key="e_timestamp">1714529970</data>
245
+ <data key="e_label_binary">malicious</data>
246
+ <data key="e_label_confidence">0.9746875</data>
247
+ <data key="e_suspicion_score">0.9746875</data>
248
+ <data key="e_mo_name">Data Theft</data>
249
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
250
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
251
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
252
+ <data key="e_lifecycle_stage">complete-mission</data>
253
+ <data key="e_disposition">Disrupted</data>
254
+ <data key="e_incident_id">3df08610-0761-11ef-b3ae-bbe9f432e5f6</data>
255
+ </edge>
256
+ </graph>
257
+ </graphml>
graph/incidents_graphml/3/3df39d30-90da-11ee-ac7c-5360e2814c47.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c6d30ff0-8d38-11ee-a390-abc884039163">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.27.115</data>
35
+ <data key="n_hostname">100.64.27.115</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.21.61.66</data>
43
+ <data key="n_hostname">172.21.61.66</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="c6d30ff0-8d38-11ee-a390-abc884039163" target="HOST-2709">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701497751</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3df39d30-90da-11ee-ac7c-5360e2814c47</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3df410a0-3655-11ef-872b-bfba974a2ef0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="984f65d0-28fa-11ef-b96f-c308e7969f10">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.121</data>
35
+ <data key="n_hostname">100.64.18.121</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="84a1bff1-28fb-11ef-8a9d-45659198471d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.232.220</data>
43
+ <data key="n_hostname">172.16.232.220</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="984f65d0-28fa-11ef-b96f-c308e7969f10" target="HOST-4717">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1719692521</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3df410a0-3655-11ef-872b-bfba974a2ef0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3dfacad0-2b9d-11ee-a75c-6705ed43e196.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2d2acb82-0625-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.78.41</data>
35
+ <data key="n_hostname">172.31.78.41</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="06a2bca0-0ab9-11ee-9ff1-d3902798f713">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.13.121</data>
43
+ <data key="n_hostname">100.64.13.121</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.30.174.172</data>
51
+ <data key="n_hostname">172.30.174.172</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-2807" target="06a2bca0-0ab9-11ee-9ff1-d3902798f713">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1690366484</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">3dfacad0-2b9d-11ee-a75c-6705ed43e196</data>
69
+ </edge>
70
+ <edge id="e2" source="06a2bca0-0ab9-11ee-9ff1-d3902798f713" target="HOST-2946">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1690366484</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">3dfacad0-2b9d-11ee-a75c-6705ed43e196</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/3/3dfe99b0-90da-11ee-ac7c-5360e2814c47.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d0ff36c1-0624-11ee-9792-13ac4ddb104c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.21.61.66</data>
35
+ <data key="n_hostname">172.21.61.66</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="c6d30ff0-8d38-11ee-a390-abc884039163">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.27.115</data>
43
+ <data key="n_hostname">100.64.27.115</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2709" target="HOST-5505">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701497751</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3dfe99b0-90da-11ee-ac7c-5360e2814c47</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3dffec80-fdf5-11ec-a66d-037b7a1a7f6a.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="23254b63-fdd9-11ec-a5e2-dff0e5088e30">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.81.28</data>
35
+ <data key="n_hostname">100.64.81.28</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="20cbba70-ea92-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.52</data>
43
+ <data key="n_hostname">100.64.72.52</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="23254b63-fdd9-11ec-a5e2-dff0e5088e30" target="HOST-13353">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1657199029</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3dffec80-fdf5-11ec-a66d-037b7a1a7f6a</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e007710-0c57-11ee-a19d-25527a25a69c.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.200.243</data>
35
+ <data key="n_hostname">172.30.200.243</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="7db35a82-063a-11ee-a222-3304f3c625a8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.23.203</data>
43
+ <data key="n_hostname">100.64.23.203</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2706" target="HOST-5455">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1686927933</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3e007710-0c57-11ee-a19d-25527a25a69c</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e02b6a0-3655-11ef-872b-bfba974a2ef0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="84a1bff1-28fb-11ef-8a9d-45659198471d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="984f65d0-28fa-11ef-b96f-c308e7969f10">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.18.121</data>
43
+ <data key="n_hostname">100.64.18.121</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4717" target="HOST-8610">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1719692521</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3e02b6a0-3655-11ef-872b-bfba974a2ef0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e0845f0-2f9b-11ee-812f-67af952e62fd.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="094cb515-0626-11ee-9f36-61ae8743c399">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.40</data>
35
+ <data key="n_hostname">100.64.68.40</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint CASB"]</data>
39
+ </node>
40
+ <node id="ebf97e93-0624-11ee-9ba6-513c6c61dfba">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.103</data>
43
+ <data key="n_hostname">100.64.8.103</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-11417" target="ebf97e93-0624-11ee-9ba6-513c6c61dfba">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1690805430</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3e0845f0-2f9b-11ee-812f-67af952e62fd</data>
61
+ </edge>
62
+ <edge id="e2" source="ebf97e93-0624-11ee-9ba6-513c6c61dfba" target="HOST-11417">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1690805430</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">3e0845f0-2f9b-11ee-812f-67af952e62fd</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/3/3e1025e0-90da-11ee-ac7c-5360e2814c47.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="658ef000-062f-11ee-8be0-139c95687a60">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.27.32</data>
35
+ <data key="n_hostname">100.64.27.32</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.86.34</data>
43
+ <data key="n_hostname">172.23.86.34</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.24.247.113</data>
51
+ <data key="n_hostname">172.24.247.113</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-5459" target="HOST-2717">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1701497751</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">3e1025e0-90da-11ee-ac7c-5360e2814c47</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-5459" target="HOST-2759">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1701497751</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">3e1025e0-90da-11ee-ac7c-5360e2814c47</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/3/3e11d1d0-3655-11ef-872b-bfba974a2ef0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b2bffd85-28f5-11ef-83d8-b72a729a9502">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.5.140</data>
35
+ <data key="n_hostname">100.64.5.140</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="7e7fca12-28f4-11ef-a65d-2d26b03b63f9">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.86.34</data>
43
+ <data key="n_hostname">172.23.86.34</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="b2bffd85-28f5-11ef-83d8-b72a729a9502" target="HOST-3803">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1719692521</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3e11d1d0-3655-11ef-872b-bfba974a2ef0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e14fc20-7ac6-11ee-a3e7-4d4a8f436180.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="096a60b1-795d-11ee-a422-7704beef7150">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.108</data>
35
+ <data key="n_hostname">100.64.70.108</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.49375</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="094cb515-0626-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.40</data>
43
+ <data key="n_hostname">100.64.68.40</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.746875</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]</data>
47
+ </node>
48
+ <node id="a4f656f8-6f6d-11ee-8673-cb98ba87bc0c">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.29.154</data>
51
+ <data key="n_hostname">100.64.29.154</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.746875</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <node id="da5dc322-3ed8-11ee-a694-afa379b22006">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.70.109</data>
59
+ <data key="n_hostname">100.64.70.109</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.49375</data>
62
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
63
+ </node>
64
+ <edge id="e1" source="096a60b1-795d-11ee-a422-7704beef7150" target="HOST-11417">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1699070235</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.746875</data>
69
+ <data key="e_suspicion_score">0.746875</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">3e14fc20-7ac6-11ee-a3e7-4d4a8f436180</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-11417" target="096a60b1-795d-11ee-a422-7704beef7150">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1699070235</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.746875</data>
83
+ <data key="e_suspicion_score">0.746875</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">3e14fc20-7ac6-11ee-a3e7-4d4a8f436180</data>
91
+ </edge>
92
+ <edge id="e3" source="HOST-11430" target="HOST-11417">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1699070235</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.746875</data>
97
+ <data key="e_suspicion_score">0.746875</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">3e14fc20-7ac6-11ee-a3e7-4d4a8f436180</data>
105
+ </edge>
106
+ <edge id="e4" source="HOST-11417" target="HOST-11430">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1699070235</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.746875</data>
111
+ <data key="e_suspicion_score">0.746875</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">3e14fc20-7ac6-11ee-a3e7-4d4a8f436180</data>
119
+ </edge>
120
+ <edge id="e5" source="da5dc322-3ed8-11ee-a694-afa379b22006" target="HOST-11417">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1699070235</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.746875</data>
125
+ <data key="e_suspicion_score">0.746875</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">3e14fc20-7ac6-11ee-a3e7-4d4a8f436180</data>
133
+ </edge>
134
+ <edge id="e6" source="HOST-11417" target="da5dc322-3ed8-11ee-a694-afa379b22006">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1699070235</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.746875</data>
139
+ <data key="e_suspicion_score">0.746875</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">3e14fc20-7ac6-11ee-a3e7-4d4a8f436180</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>
graph/incidents_graphml/3/3e182a60-5e80-11ee-b169-95f488d76cb0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ce8a6af2-5e70-11ee-b8af-2b575e4815fc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.16.96</data>
35
+ <data key="n_hostname">100.64.16.96</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.229.11</data>
43
+ <data key="n_hostname">172.30.229.11</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="ce8a6af2-5e70-11ee-b8af-2b575e4815fc" target="HOST-2750">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695961538</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3e182a60-5e80-11ee-b169-95f488d76cb0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e1ca900-90da-11ee-ac7c-5360e2814c47.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd33551-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.86.34</data>
35
+ <data key="n_hostname">172.23.86.34</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="658ef000-062f-11ee-8be0-139c95687a60">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.27.32</data>
43
+ <data key="n_hostname">100.64.27.32</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2717" target="HOST-5459">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701497751</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3e1ca900-90da-11ee-ac7c-5360e2814c47</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e201960-ace6-11ed-9c58-3fd78e20bcce.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bb8df822-9e4c-11ed-870e-a712d180d3e0">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.91.148</data>
35
+ <data key="n_hostname">100.64.91.148</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f9783d0-9d8d-11ed-8ff2-3593b92fed96">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.184.211.180</data>
43
+ <data key="n_hostname">USER-0015-1976.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="bb8df822-9e4c-11ed-870e-a712d180d3e0" target="HOST-17146">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1676434040</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3e201960-ace6-11ed-9c58-3fd78e20bcce</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e209ee0-3655-11ef-872b-bfba974a2ef0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="7e7fca12-28f4-11ef-a65d-2d26b03b63f9">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.86.34</data>
35
+ <data key="n_hostname">172.23.86.34</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b2bffd85-28f5-11ef-83d8-b72a729a9502">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.5.140</data>
43
+ <data key="n_hostname">100.64.5.140</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3803" target="HOST-8611">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1719692521</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3e209ee0-3655-11ef-872b-bfba974a2ef0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e22b550-7afd-11ed-bc1d-99c452878324.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="215c88c0-ea92-11ec-abf7-619673fe2558">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.9.103</data>
35
+ <data key="n_hostname">100.64.9.103</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
39
+ </node>
40
+ <node id="011ce671-7af9-11ed-b816-63075d37ffd5">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.70.228</data>
43
+ <data key="n_hostname">100.64.70.228</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="215c88c0-ea92-11ec-abf7-619673fe2558" target="011ce671-7af9-11ed-b816-63075d37ffd5">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1670946360</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3e22b550-7afd-11ed-bc1d-99c452878324</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e24d450-ace6-11ed-9c58-3fd78e20bcce.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9f9783d0-9d8d-11ed-8ff2-3593b92fed96">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.184.211.180</data>
35
+ <data key="n_hostname">USER-0015-1976.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="bb8df822-9e4c-11ed-870e-a712d180d3e0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.91.148</data>
43
+ <data key="n_hostname">100.64.91.148</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17146" target="HOST-18140">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1676434040</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3e24d450-ace6-11ed-9c58-3fd78e20bcce</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e26bda0-74ab-11ee-861f-33fd57670a9d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b78ea851-2b28-11ee-9c5c-19d0d4f225e5">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.43.144</data>
35
+ <data key="n_hostname">100.64.43.144</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.158.1</data>
43
+ <data key="n_hostname">172.29.158.1</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="b78ea851-2b28-11ee-9c5c-19d0d4f225e5" target="HOST-2858">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698398932</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3e26bda0-74ab-11ee-861f-33fd57670a9d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e273050-90da-11ee-ac7c-5360e2814c47.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="5e1bdad1-9019-11ee-acb4-59da010946c7">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.27.117</data>
35
+ <data key="n_hostname">100.64.27.117</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="5e1bdad1-9019-11ee-acb4-59da010946c7" target="HOST-2759">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1701497751</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3e273050-90da-11ee-ac7c-5360e2814c47</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e279370-ace6-11ed-9c58-3fd78e20bcce.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2df83160-9d9d-11ed-837f-75a8a3783d85">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.91.150</data>
35
+ <data key="n_hostname">100.64.91.150</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="9f96c082-9d8d-11ed-8ff2-3593b92fed96">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.207.79.45</data>
43
+ <data key="n_hostname">100.64.84.55</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="2df83160-9d9d-11ed-837f-75a8a3783d85" target="HOST-16878">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1676434040</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3e279370-ace6-11ed-9c58-3fd78e20bcce</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e291a50-5e80-11ee-b169-95f488d76cb0.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22b7691-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.229.11</data>
35
+ <data key="n_hostname">172.30.229.11</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="ce8a6af2-5e70-11ee-b8af-2b575e4815fc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.16.96</data>
43
+ <data key="n_hostname">100.64.16.96</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2750" target="HOST-3976">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695961538</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3e291a50-5e80-11ee-b169-95f488d76cb0</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e2ec180-589f-11ee-a130-b3fc4de2b604.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ed739ee3-588b-11ee-ac11-2532fc0237df">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.91.124</data>
35
+ <data key="n_hostname">100.64.91.124</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="659f79f1-16c6-11ee-8596-b5a423e38e2e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.74.211.215</data>
43
+ <data key="n_hostname">HOST-17029</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="ed739ee3-588b-11ee-ac11-2532fc0237df" target="HOST-17030">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695315146</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3e2ec180-589f-11ee-a130-b3fc4de2b604</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e305490-21eb-11ee-a8c2-a10defe0b4b5.graphml ADDED
@@ -0,0 +1,259 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1432aa94-064c-11ee-8134-ebd03022b92c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.18.88</data>
35
+ <data key="n_hostname">100.64.18.88</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.200.243</data>
43
+ <data key="n_hostname">172.30.200.243</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="25b766b4-062f-11ee-978b-f374a5593a56">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.30.36</data>
51
+ <data key="n_hostname">100.64.30.36</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="efc24664-0624-11ee-bb6d-91e4d286acbc">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">172.27.202.53</data>
59
+ <data key="n_hostname">172.27.202.53</data>
60
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.25</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="1c309064-0627-11ee-a510-47d18ec77e75">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.30.37</data>
67
+ <data key="n_hostname">100.64.30.37</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.25</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="969cb6f3-062a-11ee-9882-3f47c834d49b">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">172.24.191.229</data>
75
+ <data key="n_hostname">172.24.191.229</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.25</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <node id="3e8af792-0627-11ee-a360-0d0424c09388">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.11.41</data>
83
+ <data key="n_hostname">100.64.11.41</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.25</data>
86
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
87
+ </node>
88
+ <node id="702470c1-21ce-11ee-a674-edc93e89c8c4">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.30.38</data>
91
+ <data key="n_hostname">100.64.30.38</data>
92
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.25</data>
94
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
95
+ </node>
96
+ <node id="112cc041-078e-11ee-8b73-b729828553fb">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.23.158</data>
99
+ <data key="n_hostname">100.64.23.158</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.25</data>
102
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
103
+ </node>
104
+ <edge id="e1" source="HOST-4237" target="HOST-2706">
105
+ <data key="e_type">INCIDENT_LINK</data>
106
+ <data key="e_timestamp">1689300474</data>
107
+ <data key="e_label_binary">malicious</data>
108
+ <data key="e_label_confidence">0.7</data>
109
+ <data key="e_suspicion_score">0.25</data>
110
+ <data key="e_mo_name">Data Theft</data>
111
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
112
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
113
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
114
+ <data key="e_lifecycle_stage">complete-mission</data>
115
+ <data key="e_disposition">Unprocessed</data>
116
+ <data key="e_incident_id">3e305490-21eb-11ee-a8c2-a10defe0b4b5</data>
117
+ </edge>
118
+ <edge id="e2" source="25b766b4-062f-11ee-978b-f374a5593a56" target="HOST-2703">
119
+ <data key="e_type">INCIDENT_LINK</data>
120
+ <data key="e_timestamp">1689300474</data>
121
+ <data key="e_label_binary">malicious</data>
122
+ <data key="e_label_confidence">0.7</data>
123
+ <data key="e_suspicion_score">0.25</data>
124
+ <data key="e_mo_name">Data Theft</data>
125
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
126
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
127
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
128
+ <data key="e_lifecycle_stage">complete-mission</data>
129
+ <data key="e_disposition">Unprocessed</data>
130
+ <data key="e_incident_id">3e305490-21eb-11ee-a8c2-a10defe0b4b5</data>
131
+ </edge>
132
+ <edge id="e3" source="HOST-2703" target="25b766b4-062f-11ee-978b-f374a5593a56">
133
+ <data key="e_type">INCIDENT_LINK</data>
134
+ <data key="e_timestamp">1689300474</data>
135
+ <data key="e_label_binary">malicious</data>
136
+ <data key="e_label_confidence">0.7</data>
137
+ <data key="e_suspicion_score">0.25</data>
138
+ <data key="e_mo_name">Data Theft</data>
139
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
140
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
141
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
142
+ <data key="e_lifecycle_stage">complete-mission</data>
143
+ <data key="e_disposition">Unprocessed</data>
144
+ <data key="e_incident_id">3e305490-21eb-11ee-a8c2-a10defe0b4b5</data>
145
+ </edge>
146
+ <edge id="e4" source="1c309064-0627-11ee-a510-47d18ec77e75" target="HOST-2839">
147
+ <data key="e_type">INCIDENT_LINK</data>
148
+ <data key="e_timestamp">1689300474</data>
149
+ <data key="e_label_binary">malicious</data>
150
+ <data key="e_label_confidence">0.7</data>
151
+ <data key="e_suspicion_score">0.25</data>
152
+ <data key="e_mo_name">Data Theft</data>
153
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
154
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
155
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
156
+ <data key="e_lifecycle_stage">complete-mission</data>
157
+ <data key="e_disposition">Unprocessed</data>
158
+ <data key="e_incident_id">3e305490-21eb-11ee-a8c2-a10defe0b4b5</data>
159
+ </edge>
160
+ <edge id="e5" source="HOST-2839" target="1c309064-0627-11ee-a510-47d18ec77e75">
161
+ <data key="e_type">INCIDENT_LINK</data>
162
+ <data key="e_timestamp">1689300474</data>
163
+ <data key="e_label_binary">malicious</data>
164
+ <data key="e_label_confidence">0.7</data>
165
+ <data key="e_suspicion_score">0.25</data>
166
+ <data key="e_mo_name">Data Theft</data>
167
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
168
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
169
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
170
+ <data key="e_lifecycle_stage">complete-mission</data>
171
+ <data key="e_disposition">Unprocessed</data>
172
+ <data key="e_incident_id">3e305490-21eb-11ee-a8c2-a10defe0b4b5</data>
173
+ </edge>
174
+ <edge id="e6" source="HOST-2839" target="HOST-3268">
175
+ <data key="e_type">INCIDENT_LINK</data>
176
+ <data key="e_timestamp">1689300474</data>
177
+ <data key="e_label_binary">malicious</data>
178
+ <data key="e_label_confidence">0.7</data>
179
+ <data key="e_suspicion_score">0.25</data>
180
+ <data key="e_mo_name">Data Theft</data>
181
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
182
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
183
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
184
+ <data key="e_lifecycle_stage">complete-mission</data>
185
+ <data key="e_disposition">Unprocessed</data>
186
+ <data key="e_incident_id">3e305490-21eb-11ee-a8c2-a10defe0b4b5</data>
187
+ </edge>
188
+ <edge id="e7" source="HOST-3268" target="HOST-2839">
189
+ <data key="e_type">INCIDENT_LINK</data>
190
+ <data key="e_timestamp">1689300474</data>
191
+ <data key="e_label_binary">malicious</data>
192
+ <data key="e_label_confidence">0.7</data>
193
+ <data key="e_suspicion_score">0.25</data>
194
+ <data key="e_mo_name">Data Theft</data>
195
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
196
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
197
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
198
+ <data key="e_lifecycle_stage">complete-mission</data>
199
+ <data key="e_disposition">Unprocessed</data>
200
+ <data key="e_incident_id">3e305490-21eb-11ee-a8c2-a10defe0b4b5</data>
201
+ </edge>
202
+ <edge id="e8" source="25b766b4-062f-11ee-978b-f374a5593a56" target="HOST-2839">
203
+ <data key="e_type">INCIDENT_LINK</data>
204
+ <data key="e_timestamp">1689300474</data>
205
+ <data key="e_label_binary">malicious</data>
206
+ <data key="e_label_confidence">0.7</data>
207
+ <data key="e_suspicion_score">0.25</data>
208
+ <data key="e_mo_name">Data Theft</data>
209
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
210
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
211
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
212
+ <data key="e_lifecycle_stage">complete-mission</data>
213
+ <data key="e_disposition">Unprocessed</data>
214
+ <data key="e_incident_id">3e305490-21eb-11ee-a8c2-a10defe0b4b5</data>
215
+ </edge>
216
+ <edge id="e9" source="HOST-2839" target="25b766b4-062f-11ee-978b-f374a5593a56">
217
+ <data key="e_type">INCIDENT_LINK</data>
218
+ <data key="e_timestamp">1689300474</data>
219
+ <data key="e_label_binary">malicious</data>
220
+ <data key="e_label_confidence">0.7</data>
221
+ <data key="e_suspicion_score">0.25</data>
222
+ <data key="e_mo_name">Data Theft</data>
223
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
224
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
225
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
226
+ <data key="e_lifecycle_stage">complete-mission</data>
227
+ <data key="e_disposition">Unprocessed</data>
228
+ <data key="e_incident_id">3e305490-21eb-11ee-a8c2-a10defe0b4b5</data>
229
+ </edge>
230
+ <edge id="e10" source="HOST-2839" target="702470c1-21ce-11ee-a674-edc93e89c8c4">
231
+ <data key="e_type">INCIDENT_LINK</data>
232
+ <data key="e_timestamp">1689300474</data>
233
+ <data key="e_label_binary">malicious</data>
234
+ <data key="e_label_confidence">0.7</data>
235
+ <data key="e_suspicion_score">0.25</data>
236
+ <data key="e_mo_name">Data Theft</data>
237
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
238
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
239
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
240
+ <data key="e_lifecycle_stage">complete-mission</data>
241
+ <data key="e_disposition">Unprocessed</data>
242
+ <data key="e_incident_id">3e305490-21eb-11ee-a8c2-a10defe0b4b5</data>
243
+ </edge>
244
+ <edge id="e11" source="HOST-2839" target="112cc041-078e-11ee-8b73-b729828553fb">
245
+ <data key="e_type">INCIDENT_LINK</data>
246
+ <data key="e_timestamp">1689300474</data>
247
+ <data key="e_label_binary">malicious</data>
248
+ <data key="e_label_confidence">0.7</data>
249
+ <data key="e_suspicion_score">0.25</data>
250
+ <data key="e_mo_name">Data Theft</data>
251
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
252
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
253
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
254
+ <data key="e_lifecycle_stage">complete-mission</data>
255
+ <data key="e_disposition">Unprocessed</data>
256
+ <data key="e_incident_id">3e305490-21eb-11ee-a8c2-a10defe0b4b5</data>
257
+ </edge>
258
+ </graph>
259
+ </graphml>
graph/incidents_graphml/3/3e367510-74ab-11ee-861f-33fd57670a9d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b9551-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.29.158.1</data>
35
+ <data key="n_hostname">172.29.158.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b78ea851-2b28-11ee-9c5c-19d0d4f225e5">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.43.144</data>
43
+ <data key="n_hostname">100.64.43.144</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2858" target="HOST-7731">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698398932</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3e367510-74ab-11ee-861f-33fd57670a9d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e3b6bb0-589f-11ee-a130-b3fc4de2b604.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="659f79f1-16c6-11ee-8596-b5a423e38e2e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">HOST-17029</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="ed739ee3-588b-11ee-ac11-2532fc0237df">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.91.124</data>
43
+ <data key="n_hostname">100.64.91.124</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-17030" target="HOST-18119">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695315146</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3e3b6bb0-589f-11ee-a130-b3fc4de2b604</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e3d9fd0-5e3f-11ed-95e5-b5536252f217.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="fad55905-eb5b-11ec-b03c-9b5131389e3a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.16.118</data>
35
+ <data key="n_hostname">100.64.16.118</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="3bf27fa5-41a9-11ed-8309-03853e266523">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.2</data>
43
+ <data key="n_hostname">100.64.71.2</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="fad55905-eb5b-11ec-b03c-9b5131389e3a" target="3bf27fa5-41a9-11ed-8309-03853e266523">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1667786123</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3e3d9fd0-5e3f-11ed-95e5-b5536252f217</data>
61
+ </edge>
62
+ <edge id="e2" source="3bf27fa5-41a9-11ed-8309-03853e266523" target="fad55905-eb5b-11ec-b03c-9b5131389e3a">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1667786123</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7890625</data>
67
+ <data key="e_suspicion_score">0.7890625</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">3e3d9fd0-5e3f-11ed-95e5-b5536252f217</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/3/3e3ebbf0-0745-11ed-9d26-9564153a7999.graphml ADDED
@@ -0,0 +1,279 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d9d38bc0-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.1.45</data>
35
+ <data key="n_hostname">USER-0015-1898.example.internal</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.841796875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="c77bacc1-f133-11ec-9b75-67425992863a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.81.71</data>
43
+ <data key="n_hostname">100.64.81.71</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.88134765625</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <node id="c2570390-ea92-11ec-abf7-619673fe2558">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.81.129</data>
51
+ <data key="n_hostname">USER-0015-1899.example.internal</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="74e1b3b1-eb5c-11ec-aaf1-cb6d19116fa6">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.81.130</data>
59
+ <data key="n_hostname">100.64.81.130</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.7890625</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="0742eeb0-f911-11ec-9234-eb341a4ac2eb">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.81.131</data>
67
+ <data key="n_hostname">100.64.81.131</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
71
+ </node>
72
+ <node id="db7099f0-ea91-11ec-90c7-eff83c975df3">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.1.29</data>
75
+ <data key="n_hostname">USER-0015-1894.example.internal</data>
76
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.841796875</data>
78
+ <data key="n_products">["Precinct","Meraki"]</data>
79
+ </node>
80
+ <node id="57196690-ea92-11ec-90c7-eff83c975df3">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.77.2</data>
83
+ <data key="n_hostname">100.64.77.2</data>
84
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.71875</data>
86
+ <data key="n_products">["Precinct","Meraki"]</data>
87
+ </node>
88
+ <node id="6bcc4080-0284-11ed-bae2-c39329388182">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.81.132</data>
91
+ <data key="n_hostname">100.64.81.132</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.7890625</data>
94
+ <data key="n_products">["Precinct","Meraki"]</data>
95
+ </node>
96
+ <edge id="e1" source="d9d38bc0-ea91-11ec-90c7-eff83c975df3" target="HOST-15920">
97
+ <data key="e_type">INCIDENT_LINK</data>
98
+ <data key="e_timestamp">1658222949</data>
99
+ <data key="e_label_binary">malicious</data>
100
+ <data key="e_label_confidence">0.88134765625</data>
101
+ <data key="e_suspicion_score">0.88134765625</data>
102
+ <data key="e_mo_name">Data Theft</data>
103
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
104
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
105
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
106
+ <data key="e_lifecycle_stage">complete-mission</data>
107
+ <data key="e_disposition">Disrupted</data>
108
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
109
+ </edge>
110
+ <edge id="e2" source="HOST-15920" target="d9d38bc0-ea91-11ec-90c7-eff83c975df3">
111
+ <data key="e_type">INCIDENT_LINK</data>
112
+ <data key="e_timestamp">1658222949</data>
113
+ <data key="e_label_binary">malicious</data>
114
+ <data key="e_label_confidence">0.88134765625</data>
115
+ <data key="e_suspicion_score">0.88134765625</data>
116
+ <data key="e_mo_name">Data Theft</data>
117
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
118
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
119
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
120
+ <data key="e_lifecycle_stage">complete-mission</data>
121
+ <data key="e_disposition">Disrupted</data>
122
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
123
+ </edge>
124
+ <edge id="e3" source="c2570390-ea92-11ec-abf7-619673fe2558" target="d9d38bc0-ea91-11ec-90c7-eff83c975df3">
125
+ <data key="e_type">INCIDENT_LINK</data>
126
+ <data key="e_timestamp">1658222949</data>
127
+ <data key="e_label_binary">malicious</data>
128
+ <data key="e_label_confidence">0.88134765625</data>
129
+ <data key="e_suspicion_score">0.88134765625</data>
130
+ <data key="e_mo_name">Data Theft</data>
131
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
132
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
133
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
134
+ <data key="e_lifecycle_stage">complete-mission</data>
135
+ <data key="e_disposition">Disrupted</data>
136
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
137
+ </edge>
138
+ <edge id="e4" source="d9d38bc0-ea91-11ec-90c7-eff83c975df3" target="c2570390-ea92-11ec-abf7-619673fe2558">
139
+ <data key="e_type">INCIDENT_LINK</data>
140
+ <data key="e_timestamp">1658222949</data>
141
+ <data key="e_label_binary">malicious</data>
142
+ <data key="e_label_confidence">0.88134765625</data>
143
+ <data key="e_suspicion_score">0.88134765625</data>
144
+ <data key="e_mo_name">Data Theft</data>
145
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
146
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
147
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
148
+ <data key="e_lifecycle_stage">complete-mission</data>
149
+ <data key="e_disposition">Disrupted</data>
150
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
151
+ </edge>
152
+ <edge id="e5" source="74e1b3b1-eb5c-11ec-aaf1-cb6d19116fa6" target="d9d38bc0-ea91-11ec-90c7-eff83c975df3">
153
+ <data key="e_type">INCIDENT_LINK</data>
154
+ <data key="e_timestamp">1658222949</data>
155
+ <data key="e_label_binary">malicious</data>
156
+ <data key="e_label_confidence">0.88134765625</data>
157
+ <data key="e_suspicion_score">0.88134765625</data>
158
+ <data key="e_mo_name">Data Theft</data>
159
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
160
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
161
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
162
+ <data key="e_lifecycle_stage">complete-mission</data>
163
+ <data key="e_disposition">Disrupted</data>
164
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
165
+ </edge>
166
+ <edge id="e6" source="d9d38bc0-ea91-11ec-90c7-eff83c975df3" target="74e1b3b1-eb5c-11ec-aaf1-cb6d19116fa6">
167
+ <data key="e_type">INCIDENT_LINK</data>
168
+ <data key="e_timestamp">1658222949</data>
169
+ <data key="e_label_binary">malicious</data>
170
+ <data key="e_label_confidence">0.88134765625</data>
171
+ <data key="e_suspicion_score">0.88134765625</data>
172
+ <data key="e_mo_name">Data Theft</data>
173
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
174
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
175
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
176
+ <data key="e_lifecycle_stage">complete-mission</data>
177
+ <data key="e_disposition">Disrupted</data>
178
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
179
+ </edge>
180
+ <edge id="e7" source="0742eeb0-f911-11ec-9234-eb341a4ac2eb" target="HOST-15958">
181
+ <data key="e_type">INCIDENT_LINK</data>
182
+ <data key="e_timestamp">1658222949</data>
183
+ <data key="e_label_binary">malicious</data>
184
+ <data key="e_label_confidence">0.88134765625</data>
185
+ <data key="e_suspicion_score">0.88134765625</data>
186
+ <data key="e_mo_name">Data Theft</data>
187
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
188
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
189
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
190
+ <data key="e_lifecycle_stage">complete-mission</data>
191
+ <data key="e_disposition">Disrupted</data>
192
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
193
+ </edge>
194
+ <edge id="e8" source="HOST-15958" target="0742eeb0-f911-11ec-9234-eb341a4ac2eb">
195
+ <data key="e_type">INCIDENT_LINK</data>
196
+ <data key="e_timestamp">1658222949</data>
197
+ <data key="e_label_binary">malicious</data>
198
+ <data key="e_label_confidence">0.88134765625</data>
199
+ <data key="e_suspicion_score">0.88134765625</data>
200
+ <data key="e_mo_name">Data Theft</data>
201
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
202
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
203
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
204
+ <data key="e_lifecycle_stage">complete-mission</data>
205
+ <data key="e_disposition">Disrupted</data>
206
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
207
+ </edge>
208
+ <edge id="e9" source="HOST-15920" target="HOST-15958">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1658222949</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.88134765625</data>
213
+ <data key="e_suspicion_score">0.88134765625</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Disrupted</data>
220
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
221
+ </edge>
222
+ <edge id="e10" source="HOST-15958" target="HOST-15920">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1658222949</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.88134765625</data>
227
+ <data key="e_suspicion_score">0.88134765625</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Disrupted</data>
234
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
235
+ </edge>
236
+ <edge id="e11" source="HOST-15920" target="HOST-14536">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1658222949</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.88134765625</data>
241
+ <data key="e_suspicion_score">0.88134765625</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Disrupted</data>
248
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
249
+ </edge>
250
+ <edge id="e12" source="6bcc4080-0284-11ed-bae2-c39329388182" target="HOST-15958">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1658222949</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.88134765625</data>
255
+ <data key="e_suspicion_score">0.88134765625</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Disrupted</data>
262
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
263
+ </edge>
264
+ <edge id="e13" source="HOST-15958" target="6bcc4080-0284-11ed-bae2-c39329388182">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1658222949</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.88134765625</data>
269
+ <data key="e_suspicion_score">0.88134765625</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Disrupted</data>
276
+ <data key="e_incident_id">3e3ebbf0-0745-11ed-9d26-9564153a7999</data>
277
+ </edge>
278
+ </graph>
279
+ </graphml>
graph/incidents_graphml/3/3e4090b0-0745-11ed-9d26-9564153a7999.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="647d4301-eb29-11ec-a242-1d0d02c266bc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.62.3</data>
35
+ <data key="n_hostname">100.64.62.3</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="02054f70-ea92-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.74.8</data>
43
+ <data key="n_hostname">100.64.74.8</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <node id="f079d440-0744-11ed-9791-639230a674d2">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.81.133</data>
51
+ <data key="n_hostname">100.64.81.133</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="ebd5d950-ea95-11ec-90c7-eff83c975df3">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.16.84</data>
59
+ <data key="n_hostname">100.64.16.84</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
63
+ </node>
64
+ <edge id="e1" source="647d4301-eb29-11ec-a242-1d0d02c266bc" target="HOST-13610">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1658222949</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.841796875</data>
69
+ <data key="e_suspicion_score">0.841796875</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">3e4090b0-0745-11ed-9d26-9564153a7999</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-13610" target="647d4301-eb29-11ec-a242-1d0d02c266bc">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1658222949</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.841796875</data>
83
+ <data key="e_suspicion_score">0.841796875</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">3e4090b0-0745-11ed-9d26-9564153a7999</data>
91
+ </edge>
92
+ <edge id="e3" source="f079d440-0744-11ed-9791-639230a674d2" target="HOST-13610">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1658222949</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.841796875</data>
97
+ <data key="e_suspicion_score">0.841796875</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">3e4090b0-0745-11ed-9d26-9564153a7999</data>
105
+ </edge>
106
+ <edge id="e4" source="HOST-13610" target="f079d440-0744-11ed-9791-639230a674d2">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1658222949</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.841796875</data>
111
+ <data key="e_suspicion_score">0.841796875</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">3e4090b0-0745-11ed-9d26-9564153a7999</data>
119
+ </edge>
120
+ <edge id="e5" source="HOST-13610" target="HOST-15294">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1658222949</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.841796875</data>
125
+ <data key="e_suspicion_score">0.841796875</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">3e4090b0-0745-11ed-9d26-9564153a7999</data>
133
+ </edge>
134
+ <edge id="e6" source="HOST-15294" target="HOST-13610">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1658222949</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.841796875</data>
139
+ <data key="e_suspicion_score">0.841796875</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">3e4090b0-0745-11ed-9d26-9564153a7999</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>
graph/incidents_graphml/3/3e451b10-74ab-11ee-861f-33fd57670a9d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="1fde4103-0625-11ee-bb6d-91e4d286acbc">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.200.243</data>
35
+ <data key="n_hostname">172.30.200.243</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="84390f80-0626-11ee-b35a-9d13f89576c6">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.5.63</data>
43
+ <data key="n_hostname">100.64.5.63</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2706" target="HOST-5495">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698398932</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3e451b10-74ab-11ee-861f-33fd57670a9d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e4bd6d0-fcd3-11ed-af18-a9f44b259145.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="027695d4-c823-11ed-b38f-718276329dbf">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.101.1</data>
35
+ <data key="n_hostname">172.31.101.1</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="171d7892-d5f3-11ed-93b0-0d96a3eb82aa">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.13.127</data>
43
+ <data key="n_hostname">100.64.13.127</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3565" target="HOST-3564">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1685221973</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3e4bd6d0-fcd3-11ed-af18-a9f44b259145</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3e4d3400-fc46-11ec-b1da-11e6c916d75e.graphml ADDED
@@ -0,0 +1,149 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c1a8fed3-f64f-11ec-8bd7-8fbbfdfa83c9">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.83.10</data>
35
+ <data key="n_hostname">100.64.83.10</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="d856d6d1-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.170</data>
43
+ <data key="n_hostname">USER-0015-1679.example.internal</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.841796875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <node id="93d7de20-ea94-11ec-90c7-eff83c975df3">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.11.13</data>
51
+ <data key="n_hostname">100.64.11.13</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="baca53e0-fa12-11ec-aa3e-914e708885f6">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.83.11</data>
59
+ <data key="n_hostname">100.64.83.11</data>
60
+ <data key="n_set_roles">["Exploiting Host"]</data>
61
+ <data key="n_suspicion_score">0.578125</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <edge id="e1" source="c1a8fed3-f64f-11ec-8bd7-8fbbfdfa83c9" target="HOST-13636">
65
+ <data key="e_type">INCIDENT_LINK</data>
66
+ <data key="e_timestamp">1657013916</data>
67
+ <data key="e_label_binary">malicious</data>
68
+ <data key="e_label_confidence">0.841796875</data>
69
+ <data key="e_suspicion_score">0.841796875</data>
70
+ <data key="e_mo_name">Data Theft</data>
71
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
72
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
73
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
74
+ <data key="e_lifecycle_stage">complete-mission</data>
75
+ <data key="e_disposition">Disrupted</data>
76
+ <data key="e_incident_id">3e4d3400-fc46-11ec-b1da-11e6c916d75e</data>
77
+ </edge>
78
+ <edge id="e2" source="HOST-13636" target="c1a8fed3-f64f-11ec-8bd7-8fbbfdfa83c9">
79
+ <data key="e_type">INCIDENT_LINK</data>
80
+ <data key="e_timestamp">1657013916</data>
81
+ <data key="e_label_binary">malicious</data>
82
+ <data key="e_label_confidence">0.841796875</data>
83
+ <data key="e_suspicion_score">0.841796875</data>
84
+ <data key="e_mo_name">Data Theft</data>
85
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
86
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
87
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
88
+ <data key="e_lifecycle_stage">complete-mission</data>
89
+ <data key="e_disposition">Disrupted</data>
90
+ <data key="e_incident_id">3e4d3400-fc46-11ec-b1da-11e6c916d75e</data>
91
+ </edge>
92
+ <edge id="e3" source="93d7de20-ea94-11ec-90c7-eff83c975df3" target="HOST-13636">
93
+ <data key="e_type">INCIDENT_LINK</data>
94
+ <data key="e_timestamp">1657013916</data>
95
+ <data key="e_label_binary">malicious</data>
96
+ <data key="e_label_confidence">0.841796875</data>
97
+ <data key="e_suspicion_score">0.841796875</data>
98
+ <data key="e_mo_name">Data Theft</data>
99
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
100
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
101
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
102
+ <data key="e_lifecycle_stage">complete-mission</data>
103
+ <data key="e_disposition">Disrupted</data>
104
+ <data key="e_incident_id">3e4d3400-fc46-11ec-b1da-11e6c916d75e</data>
105
+ </edge>
106
+ <edge id="e4" source="HOST-13636" target="93d7de20-ea94-11ec-90c7-eff83c975df3">
107
+ <data key="e_type">INCIDENT_LINK</data>
108
+ <data key="e_timestamp">1657013916</data>
109
+ <data key="e_label_binary">malicious</data>
110
+ <data key="e_label_confidence">0.841796875</data>
111
+ <data key="e_suspicion_score">0.841796875</data>
112
+ <data key="e_mo_name">Data Theft</data>
113
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
114
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
115
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
116
+ <data key="e_lifecycle_stage">complete-mission</data>
117
+ <data key="e_disposition">Disrupted</data>
118
+ <data key="e_incident_id">3e4d3400-fc46-11ec-b1da-11e6c916d75e</data>
119
+ </edge>
120
+ <edge id="e5" source="baca53e0-fa12-11ec-aa3e-914e708885f6" target="HOST-13636">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1657013916</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.841796875</data>
125
+ <data key="e_suspicion_score">0.841796875</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">3e4d3400-fc46-11ec-b1da-11e6c916d75e</data>
133
+ </edge>
134
+ <edge id="e6" source="HOST-13636" target="baca53e0-fa12-11ec-aa3e-914e708885f6">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1657013916</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.841796875</data>
139
+ <data key="e_suspicion_score">0.841796875</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">3e4d3400-fc46-11ec-b1da-11e6c916d75e</data>
147
+ </edge>
148
+ </graph>
149
+ </graphml>