diff --git a/graph/incidents_graphml/3/3da99d90-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3da99d90-2b9d-11ee-a75c-6705ed43e196.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00b8c42cd65eb734cc2df12c44e0b6fa007e1554
--- /dev/null
+++ b/graph/incidents_graphml/3/3da99d90-2b9d-11ee-a75c-6705ed43e196.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.153
+ 100.64.6.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690366484
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3da99d90-2b9d-11ee-a75c-6705ed43e196
+
+
+
diff --git a/graph/incidents_graphml/3/3daaa090-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/3daaa090-fdf5-11ec-a66d-037b7a1a7f6a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90deb722d859f5c0288bd7fac78c199bf8248085
--- /dev/null
+++ b/graph/incidents_graphml/3/3daaa090-fdf5-11ec-a66d-037b7a1a7f6a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.27
+ USER-0015-1855.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657199028
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3daaa090-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+
diff --git a/graph/incidents_graphml/3/3dab9a60-0482-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3dab9a60-0482-11ee-9300-094b5588de47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be8321025353dfda4baeb7a115a51da2b02a28a7
--- /dev/null
+++ b/graph/incidents_graphml/3/3dab9a60-0482-11ee-9300-094b5588de47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686066792
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3dab9a60-0482-11ee-9300-094b5588de47
+
+
+
diff --git a/graph/incidents_graphml/3/3db2b6e0-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/3db2b6e0-fdf5-11ec-a66d-037b7a1a7f6a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a839a1aee893d63a5a2b323db8ecb3ddbe6d046
--- /dev/null
+++ b/graph/incidents_graphml/3/3db2b6e0-fdf5-11ec-a66d-037b7a1a7f6a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.27
+ USER-0015-1855.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657199028
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3db2b6e0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+
diff --git a/graph/incidents_graphml/3/3dbe8620-0482-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3dbe8620-0482-11ee-9300-094b5588de47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3adafa8214bc0436321f1c02565774e1a767d48c
--- /dev/null
+++ b/graph/incidents_graphml/3/3dbe8620-0482-11ee-9300-094b5588de47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.113
+ 100.64.60.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686066792
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3dbe8620-0482-11ee-9300-094b5588de47
+
+
+
diff --git a/graph/incidents_graphml/3/3dc1db80-e560-11ee-be14-8bb84b2c14a8.graphml b/graph/incidents_graphml/3/3dc1db80-e560-11ee-be14-8bb84b2c14a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e13b1a70cff208e626abe5211325bf6e068824e7
--- /dev/null
+++ b/graph/incidents_graphml/3/3dc1db80-e560-11ee-be14-8bb84b2c14a8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.91
+ 100.64.68.91
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1710791201
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3dc1db80-e560-11ee-be14-8bb84b2c14a8
+
+
+ INCIDENT_LINK
+ 1710791201
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3dc1db80-e560-11ee-be14-8bb84b2c14a8
+
+
+
diff --git a/graph/incidents_graphml/3/3dc34570-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/3/3dc34570-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d38a6a1a34f2d814dbf673f80cb0bfbfc0e35524
--- /dev/null
+++ b/graph/incidents_graphml/3/3dc34570-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.207
+ USER-0015-1237.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300902
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3dc34570-21ec-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/3/3dc401b0-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3dc401b0-90da-11ee-ac7c-5360e2814c47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ce60e34302e0a5b1925f3bf7a390cd294694d41
--- /dev/null
+++ b/graph/incidents_graphml/3/3dc401b0-90da-11ee-ac7c-5360e2814c47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.109
+ 100.64.27.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701497750
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3dc401b0-90da-11ee-ac7c-5360e2814c47
+
+
+
diff --git a/graph/incidents_graphml/3/3dc46700-94e4-11ee-b216-b792b1d50feb.graphml b/graph/incidents_graphml/3/3dc46700-94e4-11ee-b216-b792b1d50feb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b4bcb12588e7f7d681361e3ca45c34d56665c9a
--- /dev/null
+++ b/graph/incidents_graphml/3/3dc46700-94e4-11ee-b216-b792b1d50feb.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.123
+ 100.64.26.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.124
+ 100.64.26.124
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.46
+ 100.64.10.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.125
+ 100.64.26.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.126
+ 100.64.26.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.127
+ 100.64.26.127
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.128
+ 100.64.26.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.129
+ 100.64.26.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dc46700-94e4-11ee-b216-b792b1d50feb
+
+
+
diff --git a/graph/incidents_graphml/3/3dcc0050-fe5c-11ee-894d-f3eebee8c21c.graphml b/graph/incidents_graphml/3/3dcc0050-fe5c-11ee-894d-f3eebee8c21c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5672ef99bd50a3609aaae9482c4eb3b523fab064
--- /dev/null
+++ b/graph/incidents_graphml/3/3dcc0050-fe5c-11ee-894d-f3eebee8c21c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.174
+ 100.64.69.174
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1713538262
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3dcc0050-fe5c-11ee-894d-f3eebee8c21c
+
+
+
diff --git a/graph/incidents_graphml/3/3dd01250-0482-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3dd01250-0482-11ee-9300-094b5588de47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c65158211be635c4c0bf63d12c15f6effbb417cc
--- /dev/null
+++ b/graph/incidents_graphml/3/3dd01250-0482-11ee-9300-094b5588de47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.60.113
+ 100.64.60.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686066792
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dd01250-0482-11ee-9300-094b5588de47
+
+
+
diff --git a/graph/incidents_graphml/3/3dd04610-fe5c-11ee-894d-f3eebee8c21c.graphml b/graph/incidents_graphml/3/3dd04610-fe5c-11ee-894d-f3eebee8c21c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..159152e315c0105ec8c72e8a7315b1b37139fdc1
--- /dev/null
+++ b/graph/incidents_graphml/3/3dd04610-fe5c-11ee-894d-f3eebee8c21c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.69.174
+ 100.64.69.174
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713538262
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3dd04610-fe5c-11ee-894d-f3eebee8c21c
+
+
+
diff --git a/graph/incidents_graphml/3/3dd19640-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3dd19640-90da-11ee-ac7c-5360e2814c47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dcd61ec82b8210ccd448ed523ff66ab394753937
--- /dev/null
+++ b/graph/incidents_graphml/3/3dd19640-90da-11ee-ac7c-5360e2814c47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.111
+ 100.64.27.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701497751
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3dd19640-90da-11ee-ac7c-5360e2814c47
+
+
+
diff --git a/graph/incidents_graphml/3/3ddc92c0-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3ddc92c0-90da-11ee-ac7c-5360e2814c47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b01c188b9051194d81c14b48cc679f8fab913e67
--- /dev/null
+++ b/graph/incidents_graphml/3/3ddc92c0-90da-11ee-ac7c-5360e2814c47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.113
+ 100.64.27.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701497751
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3ddc92c0-90da-11ee-ac7c-5360e2814c47
+
+
+
diff --git a/graph/incidents_graphml/3/3ddf0c60-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3ddf0c60-0c57-11ee-a19d-25527a25a69c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3dd4744f09d3d3252b31df55a8218d324bada5c4
--- /dev/null
+++ b/graph/incidents_graphml/3/3ddf0c60-0c57-11ee-a19d-25527a25a69c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.203
+ 100.64.23.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686927933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3ddf0c60-0c57-11ee-a19d-25527a25a69c
+
+
+
diff --git a/graph/incidents_graphml/3/3ddfc780-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/3ddfc780-4e75-11ee-8a68-d180c8de201c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5b1e610ab8c227d9e5e41058809b8ed7a88558d
--- /dev/null
+++ b/graph/incidents_graphml/3/3ddfc780-4e75-11ee-8a68-d180c8de201c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.194
+ 100.64.29.194
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694197595
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ddfc780-4e75-11ee-8a68-d180c8de201c
+
+
+
diff --git a/graph/incidents_graphml/3/3de60b50-0482-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3de60b50-0482-11ee-9300-094b5588de47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4b5282b868508b220936af5900d2c4c907ada517
--- /dev/null
+++ b/graph/incidents_graphml/3/3de60b50-0482-11ee-9300-094b5588de47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.243
+ 100.64.28.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686066792
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3de60b50-0482-11ee-9300-094b5588de47
+
+
+
diff --git a/graph/incidents_graphml/3/3de76830-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3de76830-90da-11ee-ac7c-5360e2814c47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e49ccab1738a12efd4e962a1d8327be5afe3b64
--- /dev/null
+++ b/graph/incidents_graphml/3/3de76830-90da-11ee-ac7c-5360e2814c47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.113
+ 100.64.27.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701497751
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3de76830-90da-11ee-ac7c-5360e2814c47
+
+
+
diff --git a/graph/incidents_graphml/3/3df08610-0761-11ef-b3ae-bbe9f432e5f6.graphml b/graph/incidents_graphml/3/3df08610-0761-11ef-b3ae-bbe9f432e5f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0261f3b34f8c503140c3bbd45b7869ce2af20559
--- /dev/null
+++ b/graph/incidents_graphml/3/3df08610-0761-11ef-b3ae-bbe9f432e5f6.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.126
+ 100.64.2.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.152
+ 100.64.51.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.153
+ 100.64.51.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.129
+ 100.64.6.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.85
+ 100.64.47.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.112
+ 100.64.3.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714529970
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df08610-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529970
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df08610-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529970
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df08610-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529970
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df08610-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529970
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df08610-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529970
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df08610-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529970
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df08610-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529970
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df08610-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529970
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df08610-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529970
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df08610-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529970
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df08610-0761-11ef-b3ae-bbe9f432e5f6
+
+
+ INCIDENT_LINK
+ 1714529970
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df08610-0761-11ef-b3ae-bbe9f432e5f6
+
+
+
diff --git a/graph/incidents_graphml/3/3df39d30-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3df39d30-90da-11ee-ac7c-5360e2814c47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6eab49fe991db7038462cb097b493a4af16ce330
--- /dev/null
+++ b/graph/incidents_graphml/3/3df39d30-90da-11ee-ac7c-5360e2814c47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.115
+ 100.64.27.115
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701497751
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3df39d30-90da-11ee-ac7c-5360e2814c47
+
+
+
diff --git a/graph/incidents_graphml/3/3df410a0-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/3/3df410a0-3655-11ef-872b-bfba974a2ef0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..093f4f5877c0ca72d9f08e8e1e516373ff6ed33a
--- /dev/null
+++ b/graph/incidents_graphml/3/3df410a0-3655-11ef-872b-bfba974a2ef0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.121
+ 100.64.18.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719692521
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3df410a0-3655-11ef-872b-bfba974a2ef0
+
+
+
diff --git a/graph/incidents_graphml/3/3dfacad0-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3dfacad0-2b9d-11ee-a75c-6705ed43e196.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c10ad77514cf259eda9fd5cb05cc30c2b839b19
--- /dev/null
+++ b/graph/incidents_graphml/3/3dfacad0-2b9d-11ee-a75c-6705ed43e196.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.121
+ 100.64.13.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690366484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dfacad0-2b9d-11ee-a75c-6705ed43e196
+
+
+ INCIDENT_LINK
+ 1690366484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3dfacad0-2b9d-11ee-a75c-6705ed43e196
+
+
+
diff --git a/graph/incidents_graphml/3/3dfe99b0-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3dfe99b0-90da-11ee-ac7c-5360e2814c47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d3e325a95aacbc0a61fa757b1de097af5ac912e
--- /dev/null
+++ b/graph/incidents_graphml/3/3dfe99b0-90da-11ee-ac7c-5360e2814c47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.115
+ 100.64.27.115
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701497751
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3dfe99b0-90da-11ee-ac7c-5360e2814c47
+
+
+
diff --git a/graph/incidents_graphml/3/3dffec80-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/3dffec80-fdf5-11ec-a66d-037b7a1a7f6a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53f5b4cc9a21f45576e08a65ca2b976aa0614f2d
--- /dev/null
+++ b/graph/incidents_graphml/3/3dffec80-fdf5-11ec-a66d-037b7a1a7f6a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.28
+ 100.64.81.28
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.52
+ 100.64.72.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657199029
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3dffec80-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+
diff --git a/graph/incidents_graphml/3/3e007710-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3e007710-0c57-11ee-a19d-25527a25a69c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae48ee3f72f744022644c3046d83570e0e0c7541
--- /dev/null
+++ b/graph/incidents_graphml/3/3e007710-0c57-11ee-a19d-25527a25a69c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.203
+ 100.64.23.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686927933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3e007710-0c57-11ee-a19d-25527a25a69c
+
+
+
diff --git a/graph/incidents_graphml/3/3e02b6a0-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/3/3e02b6a0-3655-11ef-872b-bfba974a2ef0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa5868afa0d45640bd66a363f545773a5c9d4346
--- /dev/null
+++ b/graph/incidents_graphml/3/3e02b6a0-3655-11ef-872b-bfba974a2ef0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.121
+ 100.64.18.121
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719692521
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e02b6a0-3655-11ef-872b-bfba974a2ef0
+
+
+
diff --git a/graph/incidents_graphml/3/3e0845f0-2f9b-11ee-812f-67af952e62fd.graphml b/graph/incidents_graphml/3/3e0845f0-2f9b-11ee-812f-67af952e62fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe410ae486cad5a329d56a2c79a89760ba11050a
--- /dev/null
+++ b/graph/incidents_graphml/3/3e0845f0-2f9b-11ee-812f-67af952e62fd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690805430
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3e0845f0-2f9b-11ee-812f-67af952e62fd
+
+
+ INCIDENT_LINK
+ 1690805430
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3e0845f0-2f9b-11ee-812f-67af952e62fd
+
+
+
diff --git a/graph/incidents_graphml/3/3e1025e0-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3e1025e0-90da-11ee-ac7c-5360e2814c47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3aad5c28d53035dc2a4ea66a6bbe5ad5379ba89b
--- /dev/null
+++ b/graph/incidents_graphml/3/3e1025e0-90da-11ee-ac7c-5360e2814c47.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.32
+ 100.64.27.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701497751
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e1025e0-90da-11ee-ac7c-5360e2814c47
+
+
+ INCIDENT_LINK
+ 1701497751
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e1025e0-90da-11ee-ac7c-5360e2814c47
+
+
+
diff --git a/graph/incidents_graphml/3/3e11d1d0-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/3/3e11d1d0-3655-11ef-872b-bfba974a2ef0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0db674bbcecea0b271196acc7f9dc876a6012687
--- /dev/null
+++ b/graph/incidents_graphml/3/3e11d1d0-3655-11ef-872b-bfba974a2ef0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.140
+ 100.64.5.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719692521
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e11d1d0-3655-11ef-872b-bfba974a2ef0
+
+
+
diff --git a/graph/incidents_graphml/3/3e14fc20-7ac6-11ee-a3e7-4d4a8f436180.graphml b/graph/incidents_graphml/3/3e14fc20-7ac6-11ee-a3e7-4d4a8f436180.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..652c96e9688216fc537d2c00bc1c5bd11073b32b
--- /dev/null
+++ b/graph/incidents_graphml/3/3e14fc20-7ac6-11ee-a3e7-4d4a8f436180.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.108
+ 100.64.70.108
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.29.154
+ 100.64.29.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.109
+ 100.64.70.109
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1699070235
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e14fc20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070235
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e14fc20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070235
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e14fc20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070235
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e14fc20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070235
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e14fc20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070235
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e14fc20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+
diff --git a/graph/incidents_graphml/3/3e182a60-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3e182a60-5e80-11ee-b169-95f488d76cb0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36986d6cf87b83a91c1505578b9d18bb398ef9e0
--- /dev/null
+++ b/graph/incidents_graphml/3/3e182a60-5e80-11ee-b169-95f488d76cb0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.96
+ 100.64.16.96
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695961538
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e182a60-5e80-11ee-b169-95f488d76cb0
+
+
+
diff --git a/graph/incidents_graphml/3/3e1ca900-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3e1ca900-90da-11ee-ac7c-5360e2814c47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c867740030a2caacc0a3af4c4a999efd910234e
--- /dev/null
+++ b/graph/incidents_graphml/3/3e1ca900-90da-11ee-ac7c-5360e2814c47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.32
+ 100.64.27.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701497751
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e1ca900-90da-11ee-ac7c-5360e2814c47
+
+
+
diff --git a/graph/incidents_graphml/3/3e201960-ace6-11ed-9c58-3fd78e20bcce.graphml b/graph/incidents_graphml/3/3e201960-ace6-11ed-9c58-3fd78e20bcce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..720541b254db73372774698ee061f6cdde4bb333
--- /dev/null
+++ b/graph/incidents_graphml/3/3e201960-ace6-11ed-9c58-3fd78e20bcce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.148
+ 100.64.91.148
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676434040
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e201960-ace6-11ed-9c58-3fd78e20bcce
+
+
+
diff --git a/graph/incidents_graphml/3/3e209ee0-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/3/3e209ee0-3655-11ef-872b-bfba974a2ef0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6506baf19c4cfb292a90578f845acc123d46d129
--- /dev/null
+++ b/graph/incidents_graphml/3/3e209ee0-3655-11ef-872b-bfba974a2ef0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.140
+ 100.64.5.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719692521
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e209ee0-3655-11ef-872b-bfba974a2ef0
+
+
+
diff --git a/graph/incidents_graphml/3/3e22b550-7afd-11ed-bc1d-99c452878324.graphml b/graph/incidents_graphml/3/3e22b550-7afd-11ed-bc1d-99c452878324.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..384ff3bf1aff29759ad8bb13378782fba71f1700
--- /dev/null
+++ b/graph/incidents_graphml/3/3e22b550-7afd-11ed-bc1d-99c452878324.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.70.228
+ 100.64.70.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1670946360
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e22b550-7afd-11ed-bc1d-99c452878324
+
+
+
diff --git a/graph/incidents_graphml/3/3e24d450-ace6-11ed-9c58-3fd78e20bcce.graphml b/graph/incidents_graphml/3/3e24d450-ace6-11ed-9c58-3fd78e20bcce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..60553aafb13f61aa288bda28694e92b1c005ea97
--- /dev/null
+++ b/graph/incidents_graphml/3/3e24d450-ace6-11ed-9c58-3fd78e20bcce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1976.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.148
+ 100.64.91.148
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676434040
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e24d450-ace6-11ed-9c58-3fd78e20bcce
+
+
+
diff --git a/graph/incidents_graphml/3/3e26bda0-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/3/3e26bda0-74ab-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5bcc1e6721371732001983c5a32e472cc9d2c2cf
--- /dev/null
+++ b/graph/incidents_graphml/3/3e26bda0-74ab-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.144
+ 100.64.43.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698398932
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e26bda0-74ab-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/3/3e273050-90da-11ee-ac7c-5360e2814c47.graphml b/graph/incidents_graphml/3/3e273050-90da-11ee-ac7c-5360e2814c47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..591574491785e8ebaebcb3b74b29482dee060325
--- /dev/null
+++ b/graph/incidents_graphml/3/3e273050-90da-11ee-ac7c-5360e2814c47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.117
+ 100.64.27.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701497751
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e273050-90da-11ee-ac7c-5360e2814c47
+
+
+
diff --git a/graph/incidents_graphml/3/3e279370-ace6-11ed-9c58-3fd78e20bcce.graphml b/graph/incidents_graphml/3/3e279370-ace6-11ed-9c58-3fd78e20bcce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a494bd731a5fbf7c2d5c8fa1a14ad4e369e57711
--- /dev/null
+++ b/graph/incidents_graphml/3/3e279370-ace6-11ed-9c58-3fd78e20bcce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.150
+ 100.64.91.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1676434040
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e279370-ace6-11ed-9c58-3fd78e20bcce
+
+
+
diff --git a/graph/incidents_graphml/3/3e291a50-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3e291a50-5e80-11ee-b169-95f488d76cb0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ce21fedef50b96214356fceb0057b20d116991c
--- /dev/null
+++ b/graph/incidents_graphml/3/3e291a50-5e80-11ee-b169-95f488d76cb0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.96
+ 100.64.16.96
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695961538
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e291a50-5e80-11ee-b169-95f488d76cb0
+
+
+
diff --git a/graph/incidents_graphml/3/3e2ec180-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/3/3e2ec180-589f-11ee-a130-b3fc4de2b604.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21e1ae326c76bced030371e032f7a963288fdfbf
--- /dev/null
+++ b/graph/incidents_graphml/3/3e2ec180-589f-11ee-a130-b3fc4de2b604.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.124
+ 100.64.91.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695315146
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e2ec180-589f-11ee-a130-b3fc4de2b604
+
+
+
diff --git a/graph/incidents_graphml/3/3e305490-21eb-11ee-a8c2-a10defe0b4b5.graphml b/graph/incidents_graphml/3/3e305490-21eb-11ee-a8c2-a10defe0b4b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6bd84c713164b10ec2f62b3a3828482502640bd
--- /dev/null
+++ b/graph/incidents_graphml/3/3e305490-21eb-11ee-a8c2-a10defe0b4b5.graphml
@@ -0,0 +1,259 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.88
+ 100.64.18.88
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.36
+ 100.64.30.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.37
+ 100.64.30.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.41
+ 100.64.11.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.38
+ 100.64.30.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.158
+ 100.64.23.158
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e305490-21eb-11ee-a8c2-a10defe0b4b5
+
+
+ INCIDENT_LINK
+ 1689300474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e305490-21eb-11ee-a8c2-a10defe0b4b5
+
+
+ INCIDENT_LINK
+ 1689300474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e305490-21eb-11ee-a8c2-a10defe0b4b5
+
+
+ INCIDENT_LINK
+ 1689300474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e305490-21eb-11ee-a8c2-a10defe0b4b5
+
+
+ INCIDENT_LINK
+ 1689300474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e305490-21eb-11ee-a8c2-a10defe0b4b5
+
+
+ INCIDENT_LINK
+ 1689300474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e305490-21eb-11ee-a8c2-a10defe0b4b5
+
+
+ INCIDENT_LINK
+ 1689300474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e305490-21eb-11ee-a8c2-a10defe0b4b5
+
+
+ INCIDENT_LINK
+ 1689300474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e305490-21eb-11ee-a8c2-a10defe0b4b5
+
+
+ INCIDENT_LINK
+ 1689300474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e305490-21eb-11ee-a8c2-a10defe0b4b5
+
+
+ INCIDENT_LINK
+ 1689300474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e305490-21eb-11ee-a8c2-a10defe0b4b5
+
+
+ INCIDENT_LINK
+ 1689300474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e305490-21eb-11ee-a8c2-a10defe0b4b5
+
+
+
diff --git a/graph/incidents_graphml/3/3e367510-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/3/3e367510-74ab-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b7bbfec4f18dc26af6ba7fc7a9473750ee678df
--- /dev/null
+++ b/graph/incidents_graphml/3/3e367510-74ab-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.144
+ 100.64.43.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698398932
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e367510-74ab-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/3/3e3b6bb0-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/3/3e3b6bb0-589f-11ee-a130-b3fc4de2b604.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81b79814fcec1e5ac583555dde479e363a35e611
--- /dev/null
+++ b/graph/incidents_graphml/3/3e3b6bb0-589f-11ee-a130-b3fc4de2b604.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.124
+ 100.64.91.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695315146
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3b6bb0-589f-11ee-a130-b3fc4de2b604
+
+
+
diff --git a/graph/incidents_graphml/3/3e3d9fd0-5e3f-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/3/3e3d9fd0-5e3f-11ed-95e5-b5536252f217.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66b4ab25643c6a58c8d2a28a753325469ac5967f
--- /dev/null
+++ b/graph/incidents_graphml/3/3e3d9fd0-5e3f-11ed-95e5-b5536252f217.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.118
+ 100.64.16.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.2
+ 100.64.71.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1667786123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e3d9fd0-5e3f-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667786123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e3d9fd0-5e3f-11ed-95e5-b5536252f217
+
+
+
diff --git a/graph/incidents_graphml/3/3e3ebbf0-0745-11ed-9d26-9564153a7999.graphml b/graph/incidents_graphml/3/3e3ebbf0-0745-11ed-9d26-9564153a7999.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd7eda9aac3b2a7852090735a50ec591f18a718f
--- /dev/null
+++ b/graph/incidents_graphml/3/3e3ebbf0-0745-11ed-9d26-9564153a7999.graphml
@@ -0,0 +1,279 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.45
+ USER-0015-1898.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.71
+ 100.64.81.71
+ ["Exploiting Target","Exploiting Host"]
+ 0.88134765625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.129
+ USER-0015-1899.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.130
+ 100.64.81.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.131
+ 100.64.81.131
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.29
+ USER-0015-1894.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.2
+ 100.64.77.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.132
+ 100.64.81.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e3ebbf0-0745-11ed-9d26-9564153a7999
+
+
+
diff --git a/graph/incidents_graphml/3/3e4090b0-0745-11ed-9d26-9564153a7999.graphml b/graph/incidents_graphml/3/3e4090b0-0745-11ed-9d26-9564153a7999.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06a9f891d32c7930b52df39a3a77e76995b3ecdc
--- /dev/null
+++ b/graph/incidents_graphml/3/3e4090b0-0745-11ed-9d26-9564153a7999.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.3
+ 100.64.62.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.8
+ 100.64.74.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.133
+ 100.64.81.133
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.16.84
+ 100.64.16.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e4090b0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e4090b0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e4090b0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e4090b0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e4090b0-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222949
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e4090b0-0745-11ed-9d26-9564153a7999
+
+
+
diff --git a/graph/incidents_graphml/3/3e451b10-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/3/3e451b10-74ab-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5108ff051b71db7251e67780978e16e2be9cbf4
--- /dev/null
+++ b/graph/incidents_graphml/3/3e451b10-74ab-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.63
+ 100.64.5.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698398932
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e451b10-74ab-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/3/3e4bd6d0-fcd3-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/3e4bd6d0-fcd3-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df591aebd688e18e7c7e53b8d880669ac4ff6340
--- /dev/null
+++ b/graph/incidents_graphml/3/3e4bd6d0-fcd3-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.13.127
+ 100.64.13.127
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685221973
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e4bd6d0-fcd3-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/3/3e4d3400-fc46-11ec-b1da-11e6c916d75e.graphml b/graph/incidents_graphml/3/3e4d3400-fc46-11ec-b1da-11e6c916d75e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..177961c5d943dc768cb70088fe11bede7eb2f7c4
--- /dev/null
+++ b/graph/incidents_graphml/3/3e4d3400-fc46-11ec-b1da-11e6c916d75e.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.10
+ 100.64.83.10
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.170
+ USER-0015-1679.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.11.13
+ 100.64.11.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.11
+ 100.64.83.11
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657013916
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e4d3400-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013916
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e4d3400-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013916
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e4d3400-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013916
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e4d3400-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013916
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e4d3400-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013916
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e4d3400-fc46-11ec-b1da-11e6c916d75e
+
+
+
diff --git a/graph/incidents_graphml/3/3e616dd0-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3e616dd0-2f13-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..030eb3f811ced0b793989e0a5a7a207b1f17a6c1
--- /dev/null
+++ b/graph/incidents_graphml/3/3e616dd0-2f13-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.10
+ 100.64.97.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.91
+ 100.64.90.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662599521
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e616dd0-2f13-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/3/3e665eb0-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/3/3e665eb0-74ab-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c84ec45afd4e889c09309aa85ed40e5659c4465
--- /dev/null
+++ b/graph/incidents_graphml/3/3e665eb0-74ab-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.146
+ 100.64.43.146
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698398933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e665eb0-74ab-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/3/3e69f5d0-94e4-11ee-b216-b792b1d50feb.graphml b/graph/incidents_graphml/3/3e69f5d0-94e4-11ee-b216-b792b1d50feb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83a213d2ce6489ae6a8e766c80d4539eaede1559
--- /dev/null
+++ b/graph/incidents_graphml/3/3e69f5d0-94e4-11ee-b216-b792b1d50feb.graphml
@@ -0,0 +1,409 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.46
+ 100.64.19.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.137
+ 100.64.26.137
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.103
+ 100.64.26.103
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.138
+ 100.64.26.138
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.139
+ 100.64.26.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.140
+ 100.64.26.140
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.141
+ 100.64.26.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.142
+ 100.64.26.142
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.118
+ 100.64.12.118
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.104
+ USER-0015-1261.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.246
+ 100.64.13.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e69f5d0-94e4-11ee-b216-b792b1d50feb
+
+
+
diff --git a/graph/incidents_graphml/3/3e6fde10-0745-11ed-9d26-9564153a7999.graphml b/graph/incidents_graphml/3/3e6fde10-0745-11ed-9d26-9564153a7999.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4128db1a21d3429d436b2210e1f75c34aee78e3e
--- /dev/null
+++ b/graph/incidents_graphml/3/3e6fde10-0745-11ed-9d26-9564153a7999.graphml
@@ -0,0 +1,373 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.109
+ 100.64.7.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.38
+ USER-0015-1740.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.134
+ 100.64.81.134
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.135
+ 100.64.81.135
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.2.241
+ 100.64.2.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.136
+ 100.64.81.136
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.137
+ 100.64.81.137
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.138
+ 100.64.81.138
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.90
+ USER-0015-1841.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.106
+ 100.64.73.106
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e6fde10-0745-11ed-9d26-9564153a7999
+
+
+
diff --git a/graph/incidents_graphml/3/3e71a690-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/3/3e71a690-769e-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51f16890ce4efd87fe7eeecf33117adaa4880181
--- /dev/null
+++ b/graph/incidents_graphml/3/3e71a690-769e-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.30
+ 100.64.55.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698613252
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e71a690-769e-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/3/3e74ad20-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/3/3e74ad20-2768-11ee-b240-577a40e6eef6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2eabd59a8fc358a19577310acd0816a2acf2199a
--- /dev/null
+++ b/graph/incidents_graphml/3/3e74ad20-2768-11ee-b240-577a40e6eef6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.20
+ 100.64.19.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689903917
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e74ad20-2768-11ee-b240-577a40e6eef6
+
+
+
diff --git a/graph/incidents_graphml/3/3e77eae0-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/3/3e77eae0-74ab-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2edc35b0b9da2caa00ed8bc14dc734d503b28114
--- /dev/null
+++ b/graph/incidents_graphml/3/3e77eae0-74ab-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.146
+ 100.64.43.146
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698398933
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3e77eae0-74ab-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/3/3e81fa40-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/3/3e81fa40-769e-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3cfa4b1d685170d24e8573229b51f437ce84dec5
--- /dev/null
+++ b/graph/incidents_graphml/3/3e81fa40-769e-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.30
+ 100.64.55.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698613252
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3e81fa40-769e-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/3/3e8c4160-ff80-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/3/3e8c4160-ff80-11ee-b9e5-11c35e54feda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e8062e1dccb3150f2f75d70a6a2fa3e12f8a50b
--- /dev/null
+++ b/graph/incidents_graphml/3/3e8c4160-ff80-11ee-b9e5-11c35e54feda.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.232
+ 100.64.69.232
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1713663676
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e8c4160-ff80-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663676
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e8c4160-ff80-11ee-b9e5-11c35e54feda
+
+
+
diff --git a/graph/incidents_graphml/3/3e8f9880-a5f6-11ee-bc9b-590f3fe4ac14.graphml b/graph/incidents_graphml/3/3e8f9880-a5f6-11ee-bc9b-590f3fe4ac14.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd4c95ef6c699b9e0d8c85e19a4681d98365f371
--- /dev/null
+++ b/graph/incidents_graphml/3/3e8f9880-a5f6-11ee-bc9b-590f3fe4ac14.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.150
+ 100.64.29.150
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1703818752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3e8f9880-a5f6-11ee-bc9b-590f3fe4ac14
+
+
+ INCIDENT_LINK
+ 1703818752
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3e8f9880-a5f6-11ee-bc9b-590f3fe4ac14
+
+
+
diff --git a/graph/incidents_graphml/3/3e91d210-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/3/3e91d210-2768-11ee-b240-577a40e6eef6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..724e8226bcd9aabe834bbe46ab4a3c73334b1b17
--- /dev/null
+++ b/graph/incidents_graphml/3/3e91d210-2768-11ee-b240-577a40e6eef6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.20
+ 100.64.19.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689903917
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3e91d210-2768-11ee-b240-577a40e6eef6
+
+
+
diff --git a/graph/incidents_graphml/3/3e9439d0-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/3/3e9439d0-f25b-11ec-b513-c302b572dea2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..885aadecb051131d8623d9e70cac24c531eb6ae4
--- /dev/null
+++ b/graph/incidents_graphml/3/3e9439d0-f25b-11ec-b513-c302b572dea2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.111
+ 100.64.73.111
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.3
+ 100.64.72.3
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655923424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e9439d0-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923424
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3e9439d0-f25b-11ec-b513-c302b572dea2
+
+
+
diff --git a/graph/incidents_graphml/3/3e96e500-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/3/3e96e500-2611-11ee-a11d-5dcee9a57544.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c64c0ceedbc4c5507e6f1c1b4d3342a42b4444ef
--- /dev/null
+++ b/graph/incidents_graphml/3/3e96e500-2611-11ee-a11d-5dcee9a57544.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.111
+ 100.64.57.111
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689756600
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3e96e500-2611-11ee-a11d-5dcee9a57544
+
+
+
diff --git a/graph/incidents_graphml/3/3ea94240-6590-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/3/3ea94240-6590-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac44e880ebfaf70d1dd5ba1c611bbe2f2ebab5ea
--- /dev/null
+++ b/graph/incidents_graphml/3/3ea94240-6590-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.22
+ 100.64.21.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.92
+ 100.64.32.92
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.34
+ 100.64.27.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.93
+ 100.64.32.93
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.94
+ 100.64.32.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ea94240-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ea94240-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ea94240-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ea94240-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ea94240-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ea94240-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ea94240-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ea94240-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ea94240-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ea94240-6590-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/3/3eb253b0-6092-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/3/3eb253b0-6092-11ee-a31b-270f2d0ccd3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6932c4f8b0d1507bfdb7bf10cfbcc0c7c651aa9
--- /dev/null
+++ b/graph/incidents_graphml/3/3eb253b0-6092-11ee-a31b-270f2d0ccd3d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.243
+ 100.64.11.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1696189172
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eb253b0-6092-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189172
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eb253b0-6092-11ee-a31b-270f2d0ccd3d
+
+
+
diff --git a/graph/incidents_graphml/3/3eb6afc0-6590-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/3/3eb6afc0-6590-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45fc6199c6b012595db3663c1d9cab23202de894
--- /dev/null
+++ b/graph/incidents_graphml/3/3eb6afc0-6590-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,811 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.179
+ 100.64.21.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.98
+ 100.64.32.98
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.54
+ 100.64.32.54
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.99
+ 100.64.32.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.100
+ 100.64.32.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.101
+ 100.64.32.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.244
+ 100.64.17.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.102
+ 100.64.32.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.103
+ 100.64.32.103
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.104
+ 100.64.32.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.225
+ 100.64.29.225
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.105
+ 100.64.32.105
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.106
+ 100.64.32.106
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.240
+ 100.64.31.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.107
+ 100.64.32.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.108
+ 100.64.32.108
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738069
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3eb6afc0-6590-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/3/3ec6b9e0-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3ec6b9e0-5e80-11ee-b169-95f488d76cb0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49a570db4bbd26cc92a9380d0260414182b04fe9
--- /dev/null
+++ b/graph/incidents_graphml/3/3ec6b9e0-5e80-11ee-b169-95f488d76cb0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.98
+ 100.64.16.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695961539
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3ec6b9e0-5e80-11ee-b169-95f488d76cb0
+
+
+
diff --git a/graph/incidents_graphml/3/3ecb11e0-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/3ecb11e0-4e75-11ee-8a68-d180c8de201c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b13b0710acb401edd4a3c3df112c0d321324d88
--- /dev/null
+++ b/graph/incidents_graphml/3/3ecb11e0-4e75-11ee-8a68-d180c8de201c.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.251
+ 100.64.56.251
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.116
+ 100.64.10.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.252
+ 100.64.56.252
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.253
+ 100.64.56.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.47
+ 100.64.7.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.247
+ 100.64.23.247
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.254
+ 100.64.56.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.84
+ 100.64.12.84
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.255
+ 100.64.56.255
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.189
+ 100.64.7.189
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.83
+ 100.64.6.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.14
+ 100.64.6.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.1
+ 100.64.57.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.100
+ 100.64.43.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.1
+ 100.64.57.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.181
+ 100.64.31.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.2
+ 100.64.57.2
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.3
+ 100.64.57.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.204
+ 100.64.2.204
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ecb11e0-4e75-11ee-8a68-d180c8de201c
+
+
+
diff --git a/graph/incidents_graphml/3/3ed28df0-a8b4-11ee-bb9e-f554981233b0.graphml b/graph/incidents_graphml/3/3ed28df0-a8b4-11ee-bb9e-f554981233b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66ce6226810c7ede096bd5eeb40955af087747ca
--- /dev/null
+++ b/graph/incidents_graphml/3/3ed28df0-a8b4-11ee-bb9e-f554981233b0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.152
+ 100.64.68.152
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ INCIDENT_LINK
+ 1704120259
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ed28df0-a8b4-11ee-bb9e-f554981233b0
+
+
+ INCIDENT_LINK
+ 1704120259
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ed28df0-a8b4-11ee-bb9e-f554981233b0
+
+
+
diff --git a/graph/incidents_graphml/3/3ed62330-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3ed62330-5e80-11ee-b169-95f488d76cb0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..788678b04cbb68f353a622ce0aadc7720c623915
--- /dev/null
+++ b/graph/incidents_graphml/3/3ed62330-5e80-11ee-b169-95f488d76cb0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.98
+ 100.64.16.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695961539
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ed62330-5e80-11ee-b169-95f488d76cb0
+
+
+
diff --git a/graph/incidents_graphml/3/3ee49a50-8d60-11ee-9951-411438339097.graphml b/graph/incidents_graphml/3/3ee49a50-8d60-11ee-9951-411438339097.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec0021ad222b331416c2858f10622a6f3ce83027
--- /dev/null
+++ b/graph/incidents_graphml/3/3ee49a50-8d60-11ee-9951-411438339097.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.35
+ 100.64.68.35
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1701115500
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ee49a50-8d60-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115500
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ee49a50-8d60-11ee-9951-411438339097
+
+
+
diff --git a/graph/incidents_graphml/3/3ee7c1a0-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/3ee7c1a0-4e75-11ee-8a68-d180c8de201c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43822e79990ca01d09f697cd0c2da8321d2f454d
--- /dev/null
+++ b/graph/incidents_graphml/3/3ee7c1a0-4e75-11ee-8a68-d180c8de201c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.12
+ 100.64.57.12
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694197596
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ee7c1a0-4e75-11ee-8a68-d180c8de201c
+
+
+
diff --git a/graph/incidents_graphml/3/3eeab360-0745-11ed-9d26-9564153a7999.graphml b/graph/incidents_graphml/3/3eeab360-0745-11ed-9d26-9564153a7999.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90b9a46e13c8802a98f6b31914a45f854ec381c1
--- /dev/null
+++ b/graph/incidents_graphml/3/3eeab360-0745-11ed-9d26-9564153a7999.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.65
+ 100.64.72.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.112
+ 100.64.71.112
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.139
+ 100.64.81.139
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.140
+ 100.64.81.140
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.141
+ 100.64.81.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.142
+ 100.64.81.142
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.143
+ 100.64.81.143
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3eeab360-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3eeab360-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3eeab360-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3eeab360-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3eeab360-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3eeab360-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3eeab360-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3eeab360-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3eeab360-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3eeab360-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3eeab360-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3eeab360-0745-11ed-9d26-9564153a7999
+
+
+
diff --git a/graph/incidents_graphml/3/3eecaf30-0745-11ed-9d26-9564153a7999.graphml b/graph/incidents_graphml/3/3eecaf30-0745-11ed-9d26-9564153a7999.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f75746641e637e02eba9898ecb99411c81bced8
--- /dev/null
+++ b/graph/incidents_graphml/3/3eecaf30-0745-11ed-9d26-9564153a7999.graphml
@@ -0,0 +1,265 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.140
+ 100.64.78.140
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.1
+ 100.64.81.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.68.216
+ 100.64.68.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.240
+ USER-0015-1630.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.144
+ 100.64.81.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.31
+ 100.64.75.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.145
+ 100.64.81.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.41
+ 100.64.71.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eecaf30-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eecaf30-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eecaf30-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eecaf30-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eecaf30-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eecaf30-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eecaf30-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eecaf30-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eecaf30-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eecaf30-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eecaf30-0745-11ed-9d26-9564153a7999
+
+
+ INCIDENT_LINK
+ 1658222950
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3eecaf30-0745-11ed-9d26-9564153a7999
+
+
+
diff --git a/graph/incidents_graphml/3/3ef34050-8d60-11ee-9951-411438339097.graphml b/graph/incidents_graphml/3/3ef34050-8d60-11ee-9951-411438339097.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a3a858b9f0bff39ebc98c9f019126b206503bdf
--- /dev/null
+++ b/graph/incidents_graphml/3/3ef34050-8d60-11ee-9951-411438339097.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.37
+ 100.64.68.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1701115500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3ef34050-8d60-11ee-9951-411438339097
+
+
+
diff --git a/graph/incidents_graphml/3/3ef7bb30-36e8-11ef-997a-f7dc07e23a4a.graphml b/graph/incidents_graphml/3/3ef7bb30-36e8-11ef-997a-f7dc07e23a4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..472c2838d232eb7ea4af3644a06dc644a712bf1e
--- /dev/null
+++ b/graph/incidents_graphml/3/3ef7bb30-36e8-11ef-997a-f7dc07e23a4a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.198
+ 100.64.86.198
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.134
+ USER-0015-1990.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719755658
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ef7bb30-36e8-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755658
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ef7bb30-36e8-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755658
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ef7bb30-36e8-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755658
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ef7bb30-36e8-11ef-997a-f7dc07e23a4a
+
+
+
diff --git a/graph/incidents_graphml/3/3efd7d20-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/3efd7d20-bb4d-11ee-a6c4-95259d299227.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..578d0952b0c9f9f0a1c286dcb86ce41cf8661dce
--- /dev/null
+++ b/graph/incidents_graphml/3/3efd7d20-bb4d-11ee-a6c4-95259d299227.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.129
+ 100.64.94.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1706165093
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3efd7d20-bb4d-11ee-a6c4-95259d299227
+
+
+
diff --git a/graph/incidents_graphml/3/3f08f840-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/3/3f08f840-58c8-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9acc85b8a4f149b779ce762d92c4b1409947cd6e
--- /dev/null
+++ b/graph/incidents_graphml/3/3f08f840-58c8-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.180
+ 100.64.8.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695332757
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3f08f840-58c8-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/3/3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/3/3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef46515ad832314a27444524a8eda019826adc13
--- /dev/null
+++ b/graph/incidents_graphml/3/3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.53
+ 100.64.80.53
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.170
+ 100.64.72.170
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.7.18
+ 100.64.7.18
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1677324388
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324388
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324388
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324388
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f0a8e70-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+
diff --git a/graph/incidents_graphml/3/3f0b11b0-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/3f0b11b0-bb4d-11ee-a6c4-95259d299227.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..008558de55f50b760d4e5a121561f0d1f06c38c0
--- /dev/null
+++ b/graph/incidents_graphml/3/3f0b11b0-bb4d-11ee-a6c4-95259d299227.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.129
+ 100.64.94.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1706165094
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3f0b11b0-bb4d-11ee-a6c4-95259d299227
+
+
+
diff --git a/graph/incidents_graphml/3/3f0c4650-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3f0c4650-fb83-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a56e7792bef63cc9e71720f4c80093cbe4e9e35b
--- /dev/null
+++ b/graph/incidents_graphml/3/3f0c4650-fb83-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.18
+ 100.64.41.18
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685077663
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f0c4650-fb83-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/3/3f135d50-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/3/3f135d50-50c0-11ed-875b-db834c6ab2cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8cbfe82c4fd993e12219e3beec59a2441dbc9ec
--- /dev/null
+++ b/graph/incidents_graphml/3/3f135d50-50c0-11ed-875b-db834c6ab2cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.21
+ 100.64.92.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1666302214
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f135d50-50c0-11ed-875b-db834c6ab2cd
+
+
+
diff --git a/graph/incidents_graphml/3/3f14df50-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f14df50-2f13-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd508345d178bbc8896bbddce15b2941a8cbf5d9
--- /dev/null
+++ b/graph/incidents_graphml/3/3f14df50-2f13-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.80
+ 100.64.77.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662599522
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f14df50-2f13-11ed-acc5-dbb3944f5f62
+
+
+ INCIDENT_LINK
+ 1662599522
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f14df50-2f13-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/3/3f15c980-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/3/3f15c980-58c8-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20c090b3f9e4e3a283b544689783a6ba680fb1dc
--- /dev/null
+++ b/graph/incidents_graphml/3/3f15c980-58c8-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.170
+ 100.64.10.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695332757
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f15c980-58c8-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/3/3f172de0-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/3/3f172de0-50c0-11ed-875b-db834c6ab2cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..325416333604abc179371c6f9f3c0c4cf206a4c5
--- /dev/null
+++ b/graph/incidents_graphml/3/3f172de0-50c0-11ed-875b-db834c6ab2cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.21
+ 100.64.92.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1666302214
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3f172de0-50c0-11ed-875b-db834c6ab2cd
+
+
+
diff --git a/graph/incidents_graphml/3/3f184de0-0598-11ef-8baf-8702a266b8b0.graphml b/graph/incidents_graphml/3/3f184de0-0598-11ef-8baf-8702a266b8b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1f3e1bb53a4d75c2addf7395031401a9092c364
--- /dev/null
+++ b/graph/incidents_graphml/3/3f184de0-0598-11ef-8baf-8702a266b8b0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.167
+ 100.64.37.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1714333692
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f184de0-0598-11ef-8baf-8702a266b8b0
+
+
+
diff --git a/graph/incidents_graphml/3/3f1bbd20-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f1bbd20-2f13-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8382f4b0cf2d4759ec88b32dfa8acd6872641595
--- /dev/null
+++ b/graph/incidents_graphml/3/3f1bbd20-2f13-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.77.80
+ 100.64.77.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662599522
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3f1bbd20-2f13-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/3/3f22e910-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f22e910-2f13-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d113f17222ffc6969f5a33063cc937251d52134
--- /dev/null
+++ b/graph/incidents_graphml/3/3f22e910-2f13-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.19
+ 100.64.97.19
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662599522
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f22e910-2f13-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/3/3f24bda0-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/3/3f24bda0-58c8-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..89b13430ba7380c229eb2957e1df7c2dbb9e545f
--- /dev/null
+++ b/graph/incidents_graphml/3/3f24bda0-58c8-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.170
+ 100.64.10.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695332757
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3f24bda0-58c8-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/3/3f2aff60-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f2aff60-2f13-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7df07558ca34abbed6041cf655ba57057b75814e
--- /dev/null
+++ b/graph/incidents_graphml/3/3f2aff60-2f13-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.19
+ 100.64.97.19
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662599522
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3f2aff60-2f13-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/3/3f2d3bd0-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3f2d3bd0-fb83-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9c713dd8c3fc1651b68578bf15590b900da8eb4
--- /dev/null
+++ b/graph/incidents_graphml/3/3f2d3bd0-fb83-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.18
+ 100.64.41.18
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685077663
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3f2d3bd0-fb83-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/3/3f3363d0-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f3363d0-2f13-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..917826ddb34b8552bac39eb684534076c8370133
--- /dev/null
+++ b/graph/incidents_graphml/3/3f3363d0-2f13-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.12
+ 100.64.97.12
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662599522
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3f3363d0-2f13-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/3/3f353890-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f353890-2f13-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0e1ffeb5db3c822c0b0fb9c7546a3c766ade319
--- /dev/null
+++ b/graph/incidents_graphml/3/3f353890-2f13-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.196
+ 100.64.19.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.109.195.54
+ 10.109.195.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1662599522
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f353890-2f13-11ed-acc5-dbb3944f5f62
+
+
+ INCIDENT_LINK
+ 1662599522
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f353890-2f13-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/3/3f370d20-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/3/3f370d20-58c8-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5c54bbc84e09e4c9b8d3d126dbe5c8730d394d6
--- /dev/null
+++ b/graph/incidents_graphml/3/3f370d20-58c8-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.180
+ 100.64.8.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695332757
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3f370d20-58c8-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/3/3f3cb2a0-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f3cb2a0-2f13-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..077b80f3cdb24653d9164265c511aed1a1b89a16
--- /dev/null
+++ b/graph/incidents_graphml/3/3f3cb2a0-2f13-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.23
+ 100.64.97.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662599523
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f3cb2a0-2f13-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/3/3f40e650-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3f40e650-0c57-11ee-a19d-25527a25a69c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9aecd822e6321ee3349742831d3840187b93961
--- /dev/null
+++ b/graph/incidents_graphml/3/3f40e650-0c57-11ee-a19d-25527a25a69c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.1
+ 100.64.24.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686927935
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f40e650-0c57-11ee-a19d-25527a25a69c
+
+
+
diff --git a/graph/incidents_graphml/3/3f453e20-2f13-11ed-acc5-dbb3944f5f62.graphml b/graph/incidents_graphml/3/3f453e20-2f13-11ed-acc5-dbb3944f5f62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3dc39c4325ba58f99e8b46c5d427d154be2dc323
--- /dev/null
+++ b/graph/incidents_graphml/3/3f453e20-2f13-11ed-acc5-dbb3944f5f62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.23
+ 100.64.97.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662599523
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3f453e20-2f13-11ed-acc5-dbb3944f5f62
+
+
+
diff --git a/graph/incidents_graphml/3/3f4a38c0-28d4-11ed-a202-d194a49bb9df.graphml b/graph/incidents_graphml/3/3f4a38c0-28d4-11ed-a202-d194a49bb9df.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d22b4a9172cd5f3b4b67e1cd61fc0a2310d1c76b
--- /dev/null
+++ b/graph/incidents_graphml/3/3f4a38c0-28d4-11ed-a202-d194a49bb9df.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.217
+ 100.64.84.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661912757
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f4a38c0-28d4-11ed-a202-d194a49bb9df
+
+
+ INCIDENT_LINK
+ 1661912757
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f4a38c0-28d4-11ed-a202-d194a49bb9df
+
+
+
diff --git a/graph/incidents_graphml/3/3f4c4fd0-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/3f4c4fd0-4e75-11ee-8a68-d180c8de201c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f3dd75dad5afebfcc5aa4cf119dd13d935d3dc4
--- /dev/null
+++ b/graph/incidents_graphml/3/3f4c4fd0-4e75-11ee-8a68-d180c8de201c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.14
+ 100.64.57.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694197597
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f4c4fd0-4e75-11ee-8a68-d180c8de201c
+
+
+
diff --git a/graph/incidents_graphml/3/3f518db0-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/3/3f518db0-402d-11ef-b594-eb5862a3661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfae66f4c3e94b68427d01a196e8dd25b067eced
--- /dev/null
+++ b/graph/incidents_graphml/3/3f518db0-402d-11ef-b594-eb5862a3661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.106
+ 100.64.85.106
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720774855
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3f518db0-402d-11ef-b594-eb5862a3661d
+
+
+
diff --git a/graph/incidents_graphml/3/3f564310-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3f564310-0c57-11ee-a19d-25527a25a69c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08bdc672dee1fbe25f4a8cd6c41346712df760f2
--- /dev/null
+++ b/graph/incidents_graphml/3/3f564310-0c57-11ee-a19d-25527a25a69c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.1
+ 100.64.24.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686927936
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3f564310-0c57-11ee-a19d-25527a25a69c
+
+
+
diff --git a/graph/incidents_graphml/3/3f5d66d0-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/3f5d66d0-4e75-11ee-8a68-d180c8de201c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78fba9017976d484d77c1c2c7275261968daa39b
--- /dev/null
+++ b/graph/incidents_graphml/3/3f5d66d0-4e75-11ee-8a68-d180c8de201c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.14
+ 100.64.57.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694197597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3f5d66d0-4e75-11ee-8a68-d180c8de201c
+
+
+
diff --git a/graph/incidents_graphml/3/3f5e7a40-a8b4-11ee-bb9e-f554981233b0.graphml b/graph/incidents_graphml/3/3f5e7a40-a8b4-11ee-bb9e-f554981233b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc86531d633baec128c440f5ab647db84c965c1d
--- /dev/null
+++ b/graph/incidents_graphml/3/3f5e7a40-a8b4-11ee-bb9e-f554981233b0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.153
+ 100.64.68.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ INCIDENT_LINK
+ 1704120260
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3f5e7a40-a8b4-11ee-bb9e-f554981233b0
+
+
+ INCIDENT_LINK
+ 1704120260
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3f5e7a40-a8b4-11ee-bb9e-f554981233b0
+
+
+
diff --git a/graph/incidents_graphml/3/3f663770-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/3f663770-1dab-11ed-b2e7-abaef9f1b8f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3ea8d78343055faaac83ad9efb6466d777cf627
--- /dev/null
+++ b/graph/incidents_graphml/3/3f663770-1dab-11ed-b2e7-abaef9f1b8f2.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.122
+ 100.64.76.122
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.158
+ 100.64.1.158
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.123
+ 100.64.76.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.124
+ 100.64.76.124
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f663770-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f663770-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f663770-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f663770-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f663770-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f663770-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+
diff --git a/graph/incidents_graphml/3/3f6d47a0-3e56-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/3/3f6d47a0-3e56-11ee-9b4e-c562a9c40af9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86bd44ef280c0d74565b94f1570cfdac5d807541
--- /dev/null
+++ b/graph/incidents_graphml/3/3f6d47a0-3e56-11ee-9b4e-c562a9c40af9.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.133
+ 100.64.69.133
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.32.161
+ 100.64.32.161
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1692425064
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f6d47a0-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425064
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f6d47a0-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425064
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f6d47a0-3e56-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692425064
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f6d47a0-3e56-11ee-9b4e-c562a9c40af9
+
+
+
diff --git a/graph/incidents_graphml/3/3f746840-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/3f746840-1dab-11ed-b2e7-abaef9f1b8f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..425be38d6f8fac4f671dbe645abafc336309c686
--- /dev/null
+++ b/graph/incidents_graphml/3/3f746840-1dab-11ed-b2e7-abaef9f1b8f2.graphml
@@ -0,0 +1,243 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.246
+ 100.64.70.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.152
+ 100.64.72.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.59
+ 100.64.1.59
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.213
+ 100.64.73.213
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.109
+ 100.64.73.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.125
+ 100.64.76.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.36
+ 100.64.1.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f746840-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f746840-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f746840-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f746840-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f746840-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f746840-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f746840-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f746840-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f746840-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f746840-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f746840-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+
diff --git a/graph/incidents_graphml/3/3f7970a0-7437-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/3/3f7970a0-7437-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a121f2dc53bfe4ffc92fcd18f9f713bfb64f1c32
--- /dev/null
+++ b/graph/incidents_graphml/3/3f7970a0-7437-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.140
+ 100.64.71.140
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.141
+ 100.64.71.141
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.18.93
+ 100.64.18.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1670201615
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f7970a0-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201615
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f7970a0-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201615
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f7970a0-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201615
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3f7970a0-7437-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/3/3f8e8ff0-3135-11ef-82e2-b166e7a5de57.graphml b/graph/incidents_graphml/3/3f8e8ff0-3135-11ef-82e2-b166e7a5de57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac2f460cba285212047523a901ce6fc5e06b3aeb
--- /dev/null
+++ b/graph/incidents_graphml/3/3f8e8ff0-3135-11ef-82e2-b166e7a5de57.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.51
+ 100.64.26.51
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.52
+ 100.64.26.52
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.53
+ 100.64.26.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.54
+ 100.64.26.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719129024
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f8e8ff0-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719129024
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f8e8ff0-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719129024
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f8e8ff0-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719129024
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f8e8ff0-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719129024
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f8e8ff0-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719129024
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f8e8ff0-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719129024
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f8e8ff0-3135-11ef-82e2-b166e7a5de57
+
+
+ INCIDENT_LINK
+ 1719129024
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3f8e8ff0-3135-11ef-82e2-b166e7a5de57
+
+
+
diff --git a/graph/incidents_graphml/3/3fa5e190-920d-11ee-afdd-6dc3cf6fdc52.graphml b/graph/incidents_graphml/3/3fa5e190-920d-11ee-afdd-6dc3cf6fdc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b39ee472eea852ae94db7ee88cdb34803dc868a9
--- /dev/null
+++ b/graph/incidents_graphml/3/3fa5e190-920d-11ee-afdd-6dc3cf6fdc52.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.44
+ 100.64.10.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701629609
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3fa5e190-920d-11ee-afdd-6dc3cf6fdc52
+
+
+ INCIDENT_LINK
+ 1701629609
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3fa5e190-920d-11ee-afdd-6dc3cf6fdc52
+
+
+
diff --git a/graph/incidents_graphml/3/3fab9490-402d-11ef-b594-eb5862a3661d.graphml b/graph/incidents_graphml/3/3fab9490-402d-11ef-b594-eb5862a3661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20b30d07530cf0ada89a4d6f038f96eacb61e5ba
--- /dev/null
+++ b/graph/incidents_graphml/3/3fab9490-402d-11ef-b594-eb5862a3661d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.42.189
+ USER-0015-1969.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.108
+ 100.64.85.108
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720774855
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3fab9490-402d-11ef-b594-eb5862a3661d
+
+
+ INCIDENT_LINK
+ 1720774855
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3fab9490-402d-11ef-b594-eb5862a3661d
+
+
+
diff --git a/graph/incidents_graphml/3/3fbc76d0-920d-11ee-afdd-6dc3cf6fdc52.graphml b/graph/incidents_graphml/3/3fbc76d0-920d-11ee-afdd-6dc3cf6fdc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42745a10c85c4daa1a4af7868c4c07bcb52f0290
--- /dev/null
+++ b/graph/incidents_graphml/3/3fbc76d0-920d-11ee-afdd-6dc3cf6fdc52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.44
+ 100.64.10.44
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701629609
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3fbc76d0-920d-11ee-afdd-6dc3cf6fdc52
+
+
+
diff --git a/graph/incidents_graphml/3/3fca6620-69cb-11ed-88c8-935f200141c8.graphml b/graph/incidents_graphml/3/3fca6620-69cb-11ed-88c8-935f200141c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c15989795ee127274cd409feae3a3715190df4b
--- /dev/null
+++ b/graph/incidents_graphml/3/3fca6620-69cb-11ed-88c8-935f200141c8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.28
+ 100.64.72.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1669055718
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3fca6620-69cb-11ed-88c8-935f200141c8
+
+
+ INCIDENT_LINK
+ 1669055718
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3fca6620-69cb-11ed-88c8-935f200141c8
+
+
+
diff --git a/graph/incidents_graphml/3/3fe4d5f0-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/3/3fe4d5f0-589f-11ee-a130-b3fc4de2b604.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76b029a0682324dfd5509b5daddc91f294e80592
--- /dev/null
+++ b/graph/incidents_graphml/3/3fe4d5f0-589f-11ee-a130-b3fc4de2b604.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.126
+ 100.64.91.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695315149
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3fe4d5f0-589f-11ee-a130-b3fc4de2b604
+
+
+
diff --git a/graph/incidents_graphml/3/3fff8800-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3fff8800-5e80-11ee-b169-95f488d76cb0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7e43f133a616b18ef9ce21b24b3d21a541c4ab8
--- /dev/null
+++ b/graph/incidents_graphml/3/3fff8800-5e80-11ee-b169-95f488d76cb0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.100
+ 100.64.16.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695961541
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3fff8800-5e80-11ee-b169-95f488d76cb0
+
+
+
diff --git a/graph/incidents_graphml/4/40007c60-3e55-11ee-9b4e-c562a9c40af9.graphml b/graph/incidents_graphml/4/40007c60-3e55-11ee-9b4e-c562a9c40af9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d3208d6f63880799b7aa6020b68caac29ac5bc6
--- /dev/null
+++ b/graph/incidents_graphml/4/40007c60-3e55-11ee-9b4e-c562a9c40af9.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.132
+ 100.64.69.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692424636
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 40007c60-3e55-11ee-9b4e-c562a9c40af9
+
+
+ INCIDENT_LINK
+ 1692424636
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 40007c60-3e55-11ee-9b4e-c562a9c40af9
+
+
+
diff --git a/graph/incidents_graphml/4/400f3f70-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/4/400f3f70-5e80-11ee-b169-95f488d76cb0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd3674a5feb8e91e3ee4818af2eec9028f288c60
--- /dev/null
+++ b/graph/incidents_graphml/4/400f3f70-5e80-11ee-b169-95f488d76cb0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.100
+ 100.64.16.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695961541
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 400f3f70-5e80-11ee-b169-95f488d76cb0
+
+
+
diff --git a/graph/incidents_graphml/4/40131540-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/4/40131540-58c8-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12106164cf8645ee77431d03c241e63a6f1a85af
--- /dev/null
+++ b/graph/incidents_graphml/4/40131540-58c8-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.4
+ 100.64.10.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695332758
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 40131540-58c8-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/4/40131ba0-d553-11ee-9e46-fb4031711de5.graphml b/graph/incidents_graphml/4/40131ba0-d553-11ee-9e46-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5193c85fa0332b5da6d2c9d4d3dbe81c9507af7
--- /dev/null
+++ b/graph/incidents_graphml/4/40131ba0-d553-11ee-9e46-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.156
+ 100.64.15.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709026402
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 40131ba0-d553-11ee-9e46-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/4/40247a60-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/4/40247a60-58c8-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61e04e4e76aa4f16a676b27920eb3c98d8979953
--- /dev/null
+++ b/graph/incidents_graphml/4/40247a60-58c8-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.4
+ 100.64.10.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695332758
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 40247a60-58c8-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/4/40340ec0-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/4/40340ec0-1dab-11ed-b2e7-abaef9f1b8f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13d168c3df0b3eef68b02d7c7b836a5b16b14353
--- /dev/null
+++ b/graph/incidents_graphml/4/40340ec0-1dab-11ed-b2e7-abaef9f1b8f2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.202.17
+ HOST-14114
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.126
+ 100.64.76.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660685687
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 40340ec0-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685687
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 40340ec0-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+
diff --git a/graph/incidents_graphml/4/403b7450-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/403b7450-41f3-11ed-a891-2d9e83e3a063.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..001ec7e0ad5b464a58a6e7326eee4475a6d0549a
--- /dev/null
+++ b/graph/incidents_graphml/4/403b7450-41f3-11ed-a891-2d9e83e3a063.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.53
+ 100.64.94.53
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.190.96.179
+ 100.64.94.50
+ []
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1664674852
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 403b7450-41f3-11ed-a891-2d9e83e3a063
+
+
+
diff --git a/graph/incidents_graphml/4/403b8850-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/403b8850-7726-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c737f5c9ef834425147bc9b9fce020960f4e7dd5
--- /dev/null
+++ b/graph/incidents_graphml/4/403b8850-7726-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.94
+ 100.64.64.94
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698671666
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 403b8850-7726-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/4/40442d20-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/40442d20-994f-11ee-8477-4312413938e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58a2b78505c4ecaa630089a316843d08b6424e81
--- /dev/null
+++ b/graph/incidents_graphml/4/40442d20-994f-11ee-8477-4312413938e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.210
+ 100.64.29.210
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702427615
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 40442d20-994f-11ee-8477-4312413938e1
+
+
+
diff --git a/graph/incidents_graphml/4/4047f770-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/4047f770-41f3-11ed-a891-2d9e83e3a063.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..680af670e03bfc65c2ce759f4b89cb6b27cedef7
--- /dev/null
+++ b/graph/incidents_graphml/4/4047f770-41f3-11ed-a891-2d9e83e3a063.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.190.96.179
+ 100.64.94.50
+ []
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.53
+ 100.64.94.53
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664674852
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4047f770-41f3-11ed-a891-2d9e83e3a063
+
+
+
diff --git a/graph/incidents_graphml/4/40499210-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/40499210-7726-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38315542dbe10cbb9e987f1acc3f8b0034d85a4b
--- /dev/null
+++ b/graph/incidents_graphml/4/40499210-7726-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.94
+ 100.64.64.94
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698671666
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 40499210-7726-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/4/405034d0-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/405034d0-41f3-11ed-a891-2d9e83e3a063.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0000e93a2cca6fd69ff60e09cc3ae55deaf08b0d
--- /dev/null
+++ b/graph/incidents_graphml/4/405034d0-41f3-11ed-a891-2d9e83e3a063.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.76.19
+ 100.64.76.19
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664674853
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 405034d0-41f3-11ed-a891-2d9e83e3a063
+
+
+
diff --git a/graph/incidents_graphml/4/40540560-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/40540560-41f3-11ed-a891-2d9e83e3a063.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a67d200286864f8f6e194fca6781c3b5f788c7b
--- /dev/null
+++ b/graph/incidents_graphml/4/40540560-41f3-11ed-a891-2d9e83e3a063.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.54
+ 100.64.94.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.190.96.179
+ 100.64.94.50
+ []
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664674853
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 40540560-41f3-11ed-a891-2d9e83e3a063
+
+
+ INCIDENT_LINK
+ 1664674853
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 40540560-41f3-11ed-a891-2d9e83e3a063
+
+
+
diff --git a/graph/incidents_graphml/4/4057d5f0-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/4057d5f0-41f3-11ed-a891-2d9e83e3a063.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04f398624cd7407d95cda73ba79e35443d21a427
--- /dev/null
+++ b/graph/incidents_graphml/4/4057d5f0-41f3-11ed-a891-2d9e83e3a063.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.190.96.179
+ 100.64.94.50
+ []
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.54
+ 100.64.94.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1664674853
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4057d5f0-41f3-11ed-a891-2d9e83e3a063
+
+
+
diff --git a/graph/incidents_graphml/4/409c7eb0-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/4/409c7eb0-0c57-11ee-a19d-25527a25a69c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f36aa2c01d402be6a4b6fc2c8050357e49d68c80
--- /dev/null
+++ b/graph/incidents_graphml/4/409c7eb0-0c57-11ee-a19d-25527a25a69c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.130
+ 100.64.49.130
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686927938
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 409c7eb0-0c57-11ee-a19d-25527a25a69c
+
+
+
diff --git a/graph/incidents_graphml/4/40a213f0-7ba8-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/4/40a213f0-7ba8-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..598e647fc69ca65fae963457d0aa0724167bc34b
--- /dev/null
+++ b/graph/incidents_graphml/4/40a213f0-7ba8-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.32
+ 100.64.27.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699167306
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 40a213f0-7ba8-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/4/40b732a0-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/4/40b732a0-0c57-11ee-a19d-25527a25a69c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0f667c35e3efc883de2e4c3167270e81184d421
--- /dev/null
+++ b/graph/incidents_graphml/4/40b732a0-0c57-11ee-a19d-25527a25a69c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.130
+ 100.64.49.130
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686927938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 40b732a0-0c57-11ee-a19d-25527a25a69c
+
+
+
diff --git a/graph/incidents_graphml/4/40bdf940-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/40bdf940-3b39-11ed-8f70-4f50899684e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c949672a001c24c6282978ff6d14f3945ceee528
--- /dev/null
+++ b/graph/incidents_graphml/4/40bdf940-3b39-11ed-8f70-4f50899684e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.40.46
+ 100.64.40.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663935260
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 40bdf940-3b39-11ed-8f70-4f50899684e5
+
+
+
diff --git a/graph/incidents_graphml/4/40c35370-36e8-11ef-997a-f7dc07e23a4a.graphml b/graph/incidents_graphml/4/40c35370-36e8-11ef-997a-f7dc07e23a4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69d16dfb602157e4256303fd16392ae430e06ee4
--- /dev/null
+++ b/graph/incidents_graphml/4/40c35370-36e8-11ef-997a-f7dc07e23a4a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.138
+ 100.64.85.138
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.65.162
+ USER-0015-1991.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719755661
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 40c35370-36e8-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755661
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 40c35370-36e8-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755661
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 40c35370-36e8-11ef-997a-f7dc07e23a4a
+
+
+ INCIDENT_LINK
+ 1719755661
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 40c35370-36e8-11ef-997a-f7dc07e23a4a
+
+
+
diff --git a/graph/incidents_graphml/4/40c3fe30-2611-11ee-a11d-5dcee9a57544.graphml b/graph/incidents_graphml/4/40c3fe30-2611-11ee-a11d-5dcee9a57544.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96fb22aab8553b22dc5b270d0f18ac19f46339ee
--- /dev/null
+++ b/graph/incidents_graphml/4/40c3fe30-2611-11ee-a11d-5dcee9a57544.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.113
+ 100.64.57.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689756603
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 40c3fe30-2611-11ee-a11d-5dcee9a57544
+
+
+
diff --git a/graph/incidents_graphml/4/40cc9de0-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/4/40cc9de0-589f-11ee-a130-b3fc4de2b604.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f330fca7b2da5c2e5b3d8ad60d8d802a3f4f560a
--- /dev/null
+++ b/graph/incidents_graphml/4/40cc9de0-589f-11ee-a130-b3fc4de2b604.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.19.255.8
+ 172.19.255.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.91.128
+ 100.64.91.128
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695315150
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 40cc9de0-589f-11ee-a130-b3fc4de2b604
+
+
+ INCIDENT_LINK
+ 1695315150
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 40cc9de0-589f-11ee-a130-b3fc4de2b604
+
+
+
diff --git a/graph/incidents_graphml/4/40df4df0-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/4/40df4df0-74ab-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..076bb0f2c66780ccf2322298a3f7e635f43f7d92
--- /dev/null
+++ b/graph/incidents_graphml/4/40df4df0-74ab-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.148
+ 100.64.43.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698398937
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 40df4df0-74ab-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/4/40e10820-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/40e10820-4e4a-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f94992cc42f5a94ee73e1751ef033a6b7238dd96
--- /dev/null
+++ b/graph/incidents_graphml/4/40e10820-4e4a-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.246
+ 100.64.48.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694179131
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 40e10820-4e4a-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/4/40e46b40-033b-11ef-835b-a3623a295d8b.graphml b/graph/incidents_graphml/4/40e46b40-033b-11ef-835b-a3623a295d8b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a8497859b0c4553a672f642a4560dfc67db905e
--- /dev/null
+++ b/graph/incidents_graphml/4/40e46b40-033b-11ef-835b-a3623a295d8b.graphml
@@ -0,0 +1,781 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.89
+ 100.64.70.89
+ ["Exploiting Host"]
+ 0.6203125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.70.90
+ 100.64.70.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.70.91
+ 100.64.70.91
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.222
+ 100.64.14.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.92
+ 100.64.70.92
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.38.254
+ USER-0015-1581.example.internal
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.17.101
+ 100.64.17.101
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.93
+ 100.64.70.93
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.2.14
+ 100.64.2.14
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.69.159
+ 100.64.69.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.94
+ 100.64.70.94
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.240
+ 100.64.9.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.95
+ 100.64.70.95
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.11.33
+ 100.64.11.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","CASB"]
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+ INCIDENT_LINK
+ 1714073849
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 40e46b40-033b-11ef-835b-a3623a295d8b
+
+
+
diff --git a/graph/incidents_graphml/4/40ef38f0-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/40ef38f0-4e4a-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f872831a1b15897e502dd2fda75db0c9ad0000be
--- /dev/null
+++ b/graph/incidents_graphml/4/40ef38f0-4e4a-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.127
+ 100.64.10.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694179131
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 40ef38f0-4e4a-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/4/40f19d70-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/4/40f19d70-74ab-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..879ffd57910dae060c040a0fc2107c3c0b409336
--- /dev/null
+++ b/graph/incidents_graphml/4/40f19d70-74ab-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.148
+ 100.64.43.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698398937
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 40f19d70-74ab-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/4/40fe2d10-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/40fe2d10-4e4a-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3604d6e7f3d7c0d984b2e1591e9e680b511dbb25
--- /dev/null
+++ b/graph/incidents_graphml/4/40fe2d10-4e4a-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.127
+ 100.64.10.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694179132
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 40fe2d10-4e4a-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/4/40fff550-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/4/40fff550-74ab-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b63482d74b31105edab034127b5b07d659b7dc75
--- /dev/null
+++ b/graph/incidents_graphml/4/40fff550-74ab-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.150
+ 100.64.43.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698398937
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 40fff550-74ab-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/4/410301f0-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/4/410301f0-999f-11ee-9648-fdeb01eb2c83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bb2a7717f025d6d1e54fde12868e147efb9a8942
--- /dev/null
+++ b/graph/incidents_graphml/4/410301f0-999f-11ee-9648-fdeb01eb2c83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.66
+ 100.64.40.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702461976
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 410301f0-999f-11ee-9648-fdeb01eb2c83
+
+
+
diff --git a/graph/incidents_graphml/4/4104ffb0-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/4/4104ffb0-02ef-11ee-800b-d36f3c94df97.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1f153027a931e249ab4e536203096682f0529e0
--- /dev/null
+++ b/graph/incidents_graphml/4/4104ffb0-02ef-11ee-800b-d36f3c94df97.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.1
+ 100.64.40.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.77
+ 100.64.72.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685893710
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4104ffb0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893710
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4104ffb0-02ef-11ee-800b-d36f3c94df97
+
+
+
diff --git a/graph/incidents_graphml/4/4105c9e0-1329-11ef-aba1-33e212db0be8.graphml b/graph/incidents_graphml/4/4105c9e0-1329-11ef-aba1-33e212db0be8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5eaae847bb4232b42a7bc6d43c0fed0568844b1
--- /dev/null
+++ b/graph/incidents_graphml/4/4105c9e0-1329-11ef-aba1-33e212db0be8.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.201
+ 100.64.22.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.147
+ 100.64.24.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.168
+ 100.64.55.168
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715825337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4105c9e0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4105c9e0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4105c9e0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4105c9e0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4105c9e0-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4105c9e0-1329-11ef-aba1-33e212db0be8
+
+
+
diff --git a/graph/incidents_graphml/4/4106d860-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/4106d860-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..286698b18d053c31cc9cfb54f73405c32ba5a38e
--- /dev/null
+++ b/graph/incidents_graphml/4/4106d860-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475186
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4106d860-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/4/4106fab0-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/4/4106fab0-b4ff-11ed-bb53-cb33bcdbc12a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8adc31afa879dacb1672fa78222657ca2671fd3
--- /dev/null
+++ b/graph/incidents_graphml/4/4106fab0-b4ff-11ed-bb53-cb33bcdbc12a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.54
+ 100.64.80.54
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.159
+ HOST-15491
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4106fab0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4106fab0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+
diff --git a/graph/incidents_graphml/4/4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/4/4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce18f7fa02525f0d1430ea0111e051bd772a02cb
--- /dev/null
+++ b/graph/incidents_graphml/4/4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.73.233
+ 100.64.73.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.80.55
+ 100.64.80.55
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.73.185
+ 100.64.73.185
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.80.56
+ 100.64.80.56
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.35
+ 100.64.78.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.20.255
+ 100.64.20.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.80.57
+ 100.64.80.57
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.74.217
+ 100.64.74.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.17.83
+ 100.64.17.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324391
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4109b9d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+
diff --git a/graph/incidents_graphml/4/41104900-74ab-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/4/41104900-74ab-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d967114ef00417b684b45a1ed507e54f4a52a43
--- /dev/null
+++ b/graph/incidents_graphml/4/41104900-74ab-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.150
+ 100.64.43.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698398937
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 41104900-74ab-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/4/41123760-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/4/41123760-e873-11ee-9a77-df185ba75d8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67a29c6b57a46f1ef1a07621ba88df6c63f185e0
--- /dev/null
+++ b/graph/incidents_graphml/4/41123760-e873-11ee-9a77-df185ba75d8e.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.230
+ 100.64.48.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.17.53
+ 100.64.17.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.30.108
+ 100.64.30.108
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.230
+ 100.64.14.230
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.122
+ 100.64.70.122
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.39.126
+ 100.64.39.126
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129220
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41123760-e873-11ee-9a77-df185ba75d8e
+
+
+
diff --git a/graph/incidents_graphml/4/4112fef0-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/4/4112fef0-4dd9-11ee-b3c2-8d33e6517b90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9248a3f71e9dda99c0dad64df2b14ea44c7cd84
--- /dev/null
+++ b/graph/incidents_graphml/4/4112fef0-4dd9-11ee-b3c2-8d33e6517b90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.165
+ 100.64.20.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694130599
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4112fef0-4dd9-11ee-b3c2-8d33e6517b90
+
+
+
diff --git a/graph/incidents_graphml/4/4113a3c0-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/4/4113a3c0-999f-11ee-9648-fdeb01eb2c83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1da4a94ef9a623f9e2ea82db22e3e7908cd3b004
--- /dev/null
+++ b/graph/incidents_graphml/4/4113a3c0-999f-11ee-9648-fdeb01eb2c83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.66
+ 100.64.40.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702461976
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4113a3c0-999f-11ee-9648-fdeb01eb2c83
+
+
+
diff --git a/graph/incidents_graphml/4/411f5930-4e14-11ee-a329-837d93fb4fa8.graphml b/graph/incidents_graphml/4/411f5930-4e14-11ee-a329-837d93fb4fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8377609bccd800767c009715e02901ee0c478c9f
--- /dev/null
+++ b/graph/incidents_graphml/4/411f5930-4e14-11ee-a329-837d93fb4fa8.graphml
@@ -0,0 +1,929 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.50
+ 100.64.37.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.254
+ 100.64.12.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.51
+ 100.64.37.51
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.52
+ 100.64.37.52
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.53
+ 100.64.37.53
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.54
+ 100.64.37.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.1
+ 100.64.30.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.55
+ 100.64.37.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.171
+ 100.64.30.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.56
+ 100.64.37.56
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.57
+ USER-0015-1310.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.179
+ 100.64.29.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.176
+ 100.64.17.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.149
+ 100.64.9.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 411f5930-4e14-11ee-a329-837d93fb4fa8
+
+
+
diff --git a/graph/incidents_graphml/4/412abc90-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/412abc90-994f-11ee-8477-4312413938e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ee4ee1bd2ea12b0dd2a18e2ef155084632b4334
--- /dev/null
+++ b/graph/incidents_graphml/4/412abc90-994f-11ee-8477-4312413938e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.132
+ 100.64.64.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702427617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 412abc90-994f-11ee-8477-4312413938e1
+
+
+
diff --git a/graph/incidents_graphml/4/412f7e50-7920-11ee-91ac-9dbe9218e297.graphml b/graph/incidents_graphml/4/412f7e50-7920-11ee-91ac-9dbe9218e297.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..389844a7829b9506e2750d9bccf736631bf48cff
--- /dev/null
+++ b/graph/incidents_graphml/4/412f7e50-7920-11ee-91ac-9dbe9218e297.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.249
+ 100.64.69.249
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1698888993
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 412f7e50-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698888993
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 412f7e50-7920-11ee-91ac-9dbe9218e297
+
+
+
diff --git a/graph/incidents_graphml/4/412fb1f0-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/4/412fb1f0-1228-11ed-99ed-adca11e4059c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e1f25085184d0d0dea1b5c0fbeddf35a3e1ef3e
--- /dev/null
+++ b/graph/incidents_graphml/4/412fb1f0-1228-11ed-99ed-adca11e4059c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.89.23
+ 100.64.89.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1659419962
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 412fb1f0-1228-11ed-99ed-adca11e4059c
+
+
+
diff --git a/graph/incidents_graphml/4/4133d0a0-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/4/4133d0a0-1228-11ed-99ed-adca11e4059c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dbbade7a87dfe40ffa28f17291f9b68a273e6bf6
--- /dev/null
+++ b/graph/incidents_graphml/4/4133d0a0-1228-11ed-99ed-adca11e4059c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.23
+ 100.64.89.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659419962
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4133d0a0-1228-11ed-99ed-adca11e4059c
+
+
+
diff --git a/graph/incidents_graphml/4/41344890-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/4/41344890-1f34-11ee-bd83-b52c9cbf0232.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6936ff91d7eafadaafbf69125250e094001ebb2a
--- /dev/null
+++ b/graph/incidents_graphml/4/41344890-1f34-11ee-bd83-b52c9cbf0232.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.211.14
+ 192.168.211.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.77.37
+ 100.64.77.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.38
+ 100.64.77.38
+ []
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689001978
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41344890-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001978
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41344890-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001978
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41344890-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001978
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41344890-1f34-11ee-bd83-b52c9cbf0232
+
+
+
diff --git a/graph/incidents_graphml/4/4136dde0-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/4/4136dde0-1228-11ed-99ed-adca11e4059c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1392731c9280d1b65cb596d30ace6c8f73b337f1
--- /dev/null
+++ b/graph/incidents_graphml/4/4136dde0-1228-11ed-99ed-adca11e4059c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.89.27
+ 100.64.89.27
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659419962
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4136dde0-1228-11ed-99ed-adca11e4059c
+
+
+
diff --git a/graph/incidents_graphml/4/413a9b10-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/413a9b10-994f-11ee-8477-4312413938e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b29a1e23ad051b93f45ba706afcf7179b7c15115
--- /dev/null
+++ b/graph/incidents_graphml/4/413a9b10-994f-11ee-8477-4312413938e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.132
+ 100.64.64.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702427617
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 413a9b10-994f-11ee-8477-4312413938e1
+
+
+
diff --git a/graph/incidents_graphml/4/413b23a0-1228-11ed-99ed-adca11e4059c.graphml b/graph/incidents_graphml/4/413b23a0-1228-11ed-99ed-adca11e4059c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42bfb94dabb97c1f1e71ec5592e60e7abc2a0a4f
--- /dev/null
+++ b/graph/incidents_graphml/4/413b23a0-1228-11ed-99ed-adca11e4059c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.27
+ 100.64.89.27
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659419962
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 413b23a0-1228-11ed-99ed-adca11e4059c
+
+
+
diff --git a/graph/incidents_graphml/4/413fb3e0-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/4/413fb3e0-65f9-11ee-b910-4dbb90e8cc17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4c460865e3f7bac0f9ee518f0107d9251c38cdb
--- /dev/null
+++ b/graph/incidents_graphml/4/413fb3e0-65f9-11ee-b910-4dbb90e8cc17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.185
+ 100.64.92.185
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696783171
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 413fb3e0-65f9-11ee-b910-4dbb90e8cc17
+
+
+
diff --git a/graph/incidents_graphml/4/414c36a0-7ba8-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/4/414c36a0-7ba8-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d54a6e48b12b4a1cf5777f3da3223d95640b79f
--- /dev/null
+++ b/graph/incidents_graphml/4/414c36a0-7ba8-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.34
+ 100.64.27.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699167307
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 414c36a0-7ba8-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/4/41511900-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/4/41511900-65f9-11ee-b910-4dbb90e8cc17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38c6e49fe8a93ffbba3f60bfc9b9de21ad50cb9f
--- /dev/null
+++ b/graph/incidents_graphml/4/41511900-65f9-11ee-b910-4dbb90e8cc17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.185
+ 100.64.92.185
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696783171
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 41511900-65f9-11ee-b910-4dbb90e8cc17
+
+
+
diff --git a/graph/incidents_graphml/4/415f4d70-fa17-11ed-a491-43a9a8789c21.graphml b/graph/incidents_graphml/4/415f4d70-fa17-11ed-a491-43a9a8789c21.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0190ada083168828f752f5d9edba66b05a2931a8
--- /dev/null
+++ b/graph/incidents_graphml/4/415f4d70-fa17-11ed-a491-43a9a8789c21.graphml
@@ -0,0 +1,789 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.36
+ 100.64.14.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.37
+ 100.64.14.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.38
+ 100.64.14.38
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.39
+ 100.64.14.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.13.216
+ 100.64.13.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.40
+ 100.64.14.40
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.41
+ 100.64.14.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.42
+ 100.64.14.42
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.43
+ 100.64.14.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.44
+ 100.64.14.44
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.45
+ 100.64.14.45
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.46
+ 100.64.14.46
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.47
+ 100.64.14.47
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.48
+ 100.64.14.48
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.49
+ 100.64.14.49
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.50
+ 100.64.14.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.51
+ 100.64.14.51
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.52
+ 100.64.14.52
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921330
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 415f4d70-fa17-11ed-a491-43a9a8789c21
+
+
+
diff --git a/graph/incidents_graphml/4/417267d0-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/417267d0-7e0f-11ee-8917-8796f098c594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8da3a4666c6fa59d843179d3cc87515642d99f19
--- /dev/null
+++ b/graph/incidents_graphml/4/417267d0-7e0f-11ee-8917-8796f098c594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.129
+ 100.64.58.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699431448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 417267d0-7e0f-11ee-8917-8796f098c594
+
+
+
diff --git a/graph/incidents_graphml/4/41727e30-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/4/41727e30-58c8-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6eac856346b5f4a57b6eb7d1b10fa3238bdcd53a
--- /dev/null
+++ b/graph/incidents_graphml/4/41727e30-58c8-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.99
+ 100.64.34.99
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695332761
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41727e30-58c8-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/4/41794140-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/4/41794140-769e-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aed9ea2921e50afce813c6c36f4d6d798ea281ea
--- /dev/null
+++ b/graph/incidents_graphml/4/41794140-769e-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.100
+ 100.64.32.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698613257
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41794140-769e-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/4/418098a0-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/418098a0-7e0f-11ee-8917-8796f098c594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfba52f11191256de564e9deb1e3034e1033802c
--- /dev/null
+++ b/graph/incidents_graphml/4/418098a0-7e0f-11ee-8917-8796f098c594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.129
+ 100.64.58.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699431448
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 418098a0-7e0f-11ee-8917-8796f098c594
+
+
+
diff --git a/graph/incidents_graphml/4/41814b40-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/4/41814b40-58c8-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3b21789ea314e5e753d157e28573e89b1e9540f0
--- /dev/null
+++ b/graph/incidents_graphml/4/41814b40-58c8-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.99
+ 100.64.34.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695332761
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 41814b40-58c8-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/4/4184e7f0-ff80-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/4/4184e7f0-ff80-11ee-b9e5-11c35e54feda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a8dbc651564d5719660ebacb603631182c80bfd
--- /dev/null
+++ b/graph/incidents_graphml/4/4184e7f0-ff80-11ee-b9e5-11c35e54feda.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.233
+ 100.64.69.233
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1713663681
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4184e7f0-ff80-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663681
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4184e7f0-ff80-11ee-b9e5-11c35e54feda
+
+
+
diff --git a/graph/incidents_graphml/4/4185f960-ff80-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/4/4185f960-ff80-11ee-b9e5-11c35e54feda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88da9874633862af76a8d66d466292b8a219e4fe
--- /dev/null
+++ b/graph/incidents_graphml/4/4185f960-ff80-11ee-b9e5-11c35e54feda.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.55
+ 100.64.8.55
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.20
+ 100.64.68.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713663681
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4185f960-ff80-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663681
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4185f960-ff80-11ee-b9e5-11c35e54feda
+
+
+
diff --git a/graph/incidents_graphml/4/41874b00-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/4/41874b00-769e-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa81285e9b70908f06e94c434445a4659a934687
--- /dev/null
+++ b/graph/incidents_graphml/4/41874b00-769e-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.100
+ 100.64.32.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698613257
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 41874b00-769e-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/4/41881070-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/4/41881070-999f-11ee-9648-fdeb01eb2c83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6b31c3649e40affb795cdfab5c9c711a3139f05
--- /dev/null
+++ b/graph/incidents_graphml/4/41881070-999f-11ee-9648-fdeb01eb2c83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.21
+ 100.64.39.21
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702461977
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 41881070-999f-11ee-9648-fdeb01eb2c83
+
+
+
diff --git a/graph/incidents_graphml/4/41896e10-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/4/41896e10-82f8-11ee-9f73-dbbba1248bb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e25dff7a5600fd3bd08b08aaa87362842aa98c8e
--- /dev/null
+++ b/graph/incidents_graphml/4/41896e10-82f8-11ee-9f73-dbbba1248bb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.19
+ 100.64.2.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699971325
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41896e10-82f8-11ee-9f73-dbbba1248bb5
+
+
+
diff --git a/graph/incidents_graphml/4/418f2df0-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/4/418f2df0-58c8-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95b4ef4844071e5bd54109e2fb2d4750df10b38c
--- /dev/null
+++ b/graph/incidents_graphml/4/418f2df0-58c8-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.223
+ 100.64.15.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695332761
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 418f2df0-58c8-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/4/41946730-fa17-11ed-a491-43a9a8789c21.graphml b/graph/incidents_graphml/4/41946730-fa17-11ed-a491-43a9a8789c21.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21c0543378663a4cdb9e8d197f2f1ed37f3e24d9
--- /dev/null
+++ b/graph/incidents_graphml/4/41946730-fa17-11ed-a491-43a9a8789c21.graphml
@@ -0,0 +1,683 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.70
+ 100.64.14.70
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.71
+ 100.64.14.71
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.72
+ 100.64.14.72
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.73
+ 100.64.14.73
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.205
+ 100.64.9.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.74
+ 100.64.14.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.75
+ 100.64.14.75
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.76
+ 100.64.14.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.77
+ 100.64.14.77
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.78
+ 100.64.14.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.79
+ 100.64.14.79
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.80
+ 100.64.14.80
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.81
+ 100.64.14.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.249
+ 100.64.5.249
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.82
+ 100.64.14.82
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.83
+ 100.64.14.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41946730-fa17-11ed-a491-43a9a8789c21
+
+
+
diff --git a/graph/incidents_graphml/4/41972250-7ba8-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/4/41972250-7ba8-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3558fdc2cbc3a2ddaa061cca983469fdd033eb4
--- /dev/null
+++ b/graph/incidents_graphml/4/41972250-7ba8-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.10
+ 100.64.12.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699167308
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41972250-7ba8-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/4/4197ca80-9e16-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/4/4197ca80-9e16-11ee-a5ab-8550688be6fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f450e98fd4e28f536985de15116a9c540087435
--- /dev/null
+++ b/graph/incidents_graphml/4/4197ca80-9e16-11ee-a5ab-8550688be6fd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.133
+ 100.64.13.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1702952892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4197ca80-9e16-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952892
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4197ca80-9e16-11ee-a5ab-8550688be6fd
+
+
+
diff --git a/graph/incidents_graphml/4/41981410-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/4/41981410-82f8-11ee-9f73-dbbba1248bb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16995784d8ccd1ffd3f19b3ae4e528ca1b0f4089
--- /dev/null
+++ b/graph/incidents_graphml/4/41981410-82f8-11ee-9f73-dbbba1248bb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.19
+ 100.64.2.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699971325
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 41981410-82f8-11ee-9f73-dbbba1248bb5
+
+
+
diff --git a/graph/incidents_graphml/4/4198d780-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/4198d780-f5ee-11ec-ae2b-8fa08eaee108.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..450a2d5f9b083d484cdd130c08e26a2e07bc77a1
--- /dev/null
+++ b/graph/incidents_graphml/4/4198d780-f5ee-11ec-ae2b-8fa08eaee108.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.33
+ 100.64.82.33
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.92
+ 100.64.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656316419
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4198d780-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316419
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4198d780-f5ee-11ec-ae2b-8fa08eaee108
+
+
+
diff --git a/graph/incidents_graphml/4/419e4920-58c8-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/4/419e4920-58c8-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..847defd6e6dbe2c5b6de0d3b3168e54134eb4d06
--- /dev/null
+++ b/graph/incidents_graphml/4/419e4920-58c8-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.223
+ 100.64.15.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695332761
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 419e4920-58c8-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/4/41a23d70-94e4-11ee-b216-b792b1d50feb.graphml b/graph/incidents_graphml/4/41a23d70-94e4-11ee-b216-b792b1d50feb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3cbeeacd8ab4910aaf1eb8cb8b5289dbf724787
--- /dev/null
+++ b/graph/incidents_graphml/4/41a23d70-94e4-11ee-b216-b792b1d50feb.graphml
@@ -0,0 +1,121 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.151
+ 100.64.26.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.152
+ 100.64.26.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701941857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41a23d70-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41a23d70-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41a23d70-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941857
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41a23d70-94e4-11ee-b216-b792b1d50feb
+
+
+
diff --git a/graph/incidents_graphml/4/41a35750-7ba8-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/4/41a35750-7ba8-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c4b7eadf77a6b606f6d43716ca4736037d29dd5
--- /dev/null
+++ b/graph/incidents_graphml/4/41a35750-7ba8-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.10
+ 100.64.12.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699167308
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 41a35750-7ba8-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/4/41b63860-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41b63860-0ef9-11ed-ae8a-a78294a70068.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..603ac87f5ca2c4fdb9c017dc53e47b33db98ef1d
--- /dev/null
+++ b/graph/incidents_graphml/4/41b63860-0ef9-11ed-ae8a-a78294a70068.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.209
+ 100.64.97.209
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659069923
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 41b63860-0ef9-11ed-ae8a-a78294a70068
+
+
+
diff --git a/graph/incidents_graphml/4/41b9e1e0-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41b9e1e0-0ef9-11ed-ae8a-a78294a70068.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9569f2d0789edf46e43e2adbf6916751d6df9bd4
--- /dev/null
+++ b/graph/incidents_graphml/4/41b9e1e0-0ef9-11ed-ae8a-a78294a70068.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.212
+ 100.64.97.212
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1985.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659069923
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41b9e1e0-0ef9-11ed-ae8a-a78294a70068
+
+
+
diff --git a/graph/incidents_graphml/4/41bde430-7ba8-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/4/41bde430-7ba8-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f5c0a0b45335036a55c4b373e34e526d48a5332
--- /dev/null
+++ b/graph/incidents_graphml/4/41bde430-7ba8-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.153
+ 100.64.9.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699167308
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 41bde430-7ba8-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/4/41c0bfb0-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41c0bfb0-0ef9-11ed-ae8a-a78294a70068.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10eddfc510b88062bfa37b955b8d0e26c3e2c596
--- /dev/null
+++ b/graph/incidents_graphml/4/41c0bfb0-0ef9-11ed-ae8a-a78294a70068.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1985.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.97.212
+ 100.64.97.212
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659069923
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 41c0bfb0-0ef9-11ed-ae8a-a78294a70068
+
+
+
diff --git a/graph/incidents_graphml/4/41c41b10-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41c41b10-0ef9-11ed-ae8a-a78294a70068.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da2ce4212599bbd35d33fe4863ed101f91b300ff
--- /dev/null
+++ b/graph/incidents_graphml/4/41c41b10-0ef9-11ed-ae8a-a78294a70068.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.218
+ 100.64.97.218
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1659069923
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41c41b10-0ef9-11ed-ae8a-a78294a70068
+
+
+
diff --git a/graph/incidents_graphml/4/41c860d0-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41c860d0-0ef9-11ed-ae8a-a78294a70068.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2cd3cc8c4c2b80af2c1cfbd59bf748c512be6f8e
--- /dev/null
+++ b/graph/incidents_graphml/4/41c860d0-0ef9-11ed-ae8a-a78294a70068.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.218
+ 100.64.97.218
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659069923
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 41c860d0-0ef9-11ed-ae8a-a78294a70068
+
+
+
diff --git a/graph/incidents_graphml/4/41c9f9a0-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/41c9f9a0-f5ee-11ec-ae2b-8fa08eaee108.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1844e136517b873e86da3c509579202cc68341f
--- /dev/null
+++ b/graph/incidents_graphml/4/41c9f9a0-f5ee-11ec-ae2b-8fa08eaee108.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.217
+ 100.64.20.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.214
+ 100.64.72.214
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656316419
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41c9f9a0-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316419
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41c9f9a0-f5ee-11ec-ae2b-8fa08eaee108
+
+
+
diff --git a/graph/incidents_graphml/4/41cb1ff0-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41cb1ff0-0ef9-11ed-ae8a-a78294a70068.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94051cf0ffd3671fbb4897d2efed9d4813a539f1
--- /dev/null
+++ b/graph/incidents_graphml/4/41cb1ff0-0ef9-11ed-ae8a-a78294a70068.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.143
+ 100.64.20.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1659069923
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 41cb1ff0-0ef9-11ed-ae8a-a78294a70068
+
+
+
diff --git a/graph/incidents_graphml/4/41d18890-0ef9-11ed-ae8a-a78294a70068.graphml b/graph/incidents_graphml/4/41d18890-0ef9-11ed-ae8a-a78294a70068.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd4a4441441aaef49062d6be7216c363508f8a17
--- /dev/null
+++ b/graph/incidents_graphml/4/41d18890-0ef9-11ed-ae8a-a78294a70068.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.20.143
+ 100.64.20.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659069923
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 41d18890-0ef9-11ed-ae8a-a78294a70068
+
+
+
diff --git a/graph/incidents_graphml/4/41dcce80-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/41dcce80-994f-11ee-8477-4312413938e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27f9a7fc8adc04f5b0a0e0f624542f6098c024af
--- /dev/null
+++ b/graph/incidents_graphml/4/41dcce80-994f-11ee-8477-4312413938e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.134
+ 100.64.64.134
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702427618
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 41dcce80-994f-11ee-8477-4312413938e1
+
+
+
diff --git a/graph/incidents_graphml/4/41e03940-7ba8-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/4/41e03940-7ba8-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34a0d71efe9bb3e33330a21a890923a8df7777f9
--- /dev/null
+++ b/graph/incidents_graphml/4/41e03940-7ba8-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.30
+ 100.64.6.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699167308
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 41e03940-7ba8-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/4/41e984d0-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/4/41e984d0-0c1a-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d444d7994d59c57e0dff69aa1f6582b25ab63e3
--- /dev/null
+++ b/graph/incidents_graphml/4/41e984d0-0c1a-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.230
+ 100.64.80.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.173
+ 100.64.1.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686901741
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41e984d0-0c1a-11ee-a535-110da53c9d07
+
+
+ INCIDENT_LINK
+ 1686901741
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41e984d0-0c1a-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/4/41ea4180-6e59-11ee-bd33-e97c9a557859.graphml b/graph/incidents_graphml/4/41ea4180-6e59-11ee-bd33-e97c9a557859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd920db8fe5f273eb94484a1bf910f6c0c86df71
--- /dev/null
+++ b/graph/incidents_graphml/4/41ea4180-6e59-11ee-bd33-e97c9a557859.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.254
+ 100.64.39.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.190
+ 100.64.36.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.25
+ 100.64.3.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.255
+ 100.64.39.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.138
+ 100.64.12.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.1
+ 100.64.40.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.1
+ 100.64.40.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.2
+ 100.64.40.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.3
+ 100.64.40.3
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.4
+ 100.64.40.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.126
+ 100.64.9.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.5
+ 100.64.40.5
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.6
+ 100.64.40.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.7
+ 100.64.40.7
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.8
+ 100.64.40.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.9
+ 100.64.40.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.10
+ 100.64.40.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.78
+ 100.64.14.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 41ea4180-6e59-11ee-bd33-e97c9a557859
+
+
+
diff --git a/graph/incidents_graphml/4/42034d00-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/42034d00-249e-11ef-8629-fb371c38e19d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4975e5e02bb1d25c1d21113759a02c1d3f1e73a
--- /dev/null
+++ b/graph/incidents_graphml/4/42034d00-249e-11ef-8629-fb371c38e19d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.122
+ 100.64.56.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717744760
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42034d00-249e-11ef-8629-fb371c38e19d
+
+
+
diff --git a/graph/incidents_graphml/4/4204ce60-6e59-11ee-bd33-e97c9a557859.graphml b/graph/incidents_graphml/4/4204ce60-6e59-11ee-bd33-e97c9a557859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e259507bad793dd3b49298405989e0e994b39dc9
--- /dev/null
+++ b/graph/incidents_graphml/4/4204ce60-6e59-11ee-bd33-e97c9a557859.graphml
@@ -0,0 +1,473 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.23
+ USER-0015-1326.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.24
+ 100.64.40.24
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.243
+ 100.64.20.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.25
+ 100.64.40.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.26
+ 100.64.40.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.27
+ 100.64.40.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.28
+ 100.64.40.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.29
+ 100.64.40.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.30
+ 100.64.40.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.224
+ 100.64.13.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.31
+ 100.64.40.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4204ce60-6e59-11ee-bd33-e97c9a557859
+
+
+
diff --git a/graph/incidents_graphml/4/42102360-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/42102360-2768-11ee-b240-577a40e6eef6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d9caaf44a366861afed57ac1abb03cbb2117962
--- /dev/null
+++ b/graph/incidents_graphml/4/42102360-2768-11ee-b240-577a40e6eef6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.116
+ 100.64.10.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689903923
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42102360-2768-11ee-b240-577a40e6eef6
+
+
+
diff --git a/graph/incidents_graphml/4/421415e0-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/421415e0-249e-11ef-8629-fb371c38e19d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09b4559bdb45fe90c9e257b18c250f59e20daf00
--- /dev/null
+++ b/graph/incidents_graphml/4/421415e0-249e-11ef-8629-fb371c38e19d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.122
+ 100.64.56.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717744760
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 421415e0-249e-11ef-8629-fb371c38e19d
+
+
+
diff --git a/graph/incidents_graphml/4/42221fa0-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/42221fa0-249e-11ef-8629-fb371c38e19d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30a12f4000171eeeb0f2d1bf7db9211f42318183
--- /dev/null
+++ b/graph/incidents_graphml/4/42221fa0-249e-11ef-8629-fb371c38e19d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.124
+ 100.64.56.124
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717744760
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 42221fa0-249e-11ef-8629-fb371c38e19d
+
+
+
diff --git a/graph/incidents_graphml/4/42255be0-e31f-11ee-acbf-dfdefbfef3c0.graphml b/graph/incidents_graphml/4/42255be0-e31f-11ee-acbf-dfdefbfef3c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95fe4dff5b53444b792e7d43c903911421fd5077
--- /dev/null
+++ b/graph/incidents_graphml/4/42255be0-e31f-11ee-acbf-dfdefbfef3c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.227
+ 100.64.68.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1710543388
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42255be0-e31f-11ee-acbf-dfdefbfef3c0
+
+
+
diff --git a/graph/incidents_graphml/4/422def50-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/4/422def50-02ef-11ee-800b-d36f3c94df97.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1485cf9dff543a174bd7207d41de4b87dd875141
--- /dev/null
+++ b/graph/incidents_graphml/4/422def50-02ef-11ee-800b-d36f3c94df97.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.162
+ 100.64.3.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.73.217
+ 100.64.73.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685893712
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 422def50-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893712
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 422def50-02ef-11ee-800b-d36f3c94df97
+
+
+
diff --git a/graph/incidents_graphml/4/422f8d20-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/4/422f8d20-249e-11ef-8629-fb371c38e19d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f63334670afb9edbc9bfb66593da671a1de450b
--- /dev/null
+++ b/graph/incidents_graphml/4/422f8d20-249e-11ef-8629-fb371c38e19d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.124
+ 100.64.56.124
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717744760
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 422f8d20-249e-11ef-8629-fb371c38e19d
+
+
+
diff --git a/graph/incidents_graphml/4/42333ba0-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/4/42333ba0-65f9-11ee-b910-4dbb90e8cc17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a1e73cf402a6a40ab1302c8efaf81c922491fd7
--- /dev/null
+++ b/graph/incidents_graphml/4/42333ba0-65f9-11ee-b910-4dbb90e8cc17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.186
+ 100.64.92.186
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696783172
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42333ba0-65f9-11ee-b910-4dbb90e8cc17
+
+
+
diff --git a/graph/incidents_graphml/4/42342620-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/42342620-2768-11ee-b240-577a40e6eef6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e5a48417a2b2ff040ed222b8f559c6a7cc396b3
--- /dev/null
+++ b/graph/incidents_graphml/4/42342620-2768-11ee-b240-577a40e6eef6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.116
+ 100.64.10.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689903923
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 42342620-2768-11ee-b240-577a40e6eef6
+
+
+
diff --git a/graph/incidents_graphml/4/42385380-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/42385380-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e055819ac7ecb9f54c046a60e69c6d1ef9b0975e
--- /dev/null
+++ b/graph/incidents_graphml/4/42385380-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.175
+ 100.64.53.175
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475189
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 42385380-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/4/423b6940-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/423b6940-994f-11ee-8477-4312413938e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85c5f200378796358d13f695ad6ed6d636dfab4c
--- /dev/null
+++ b/graph/incidents_graphml/4/423b6940-994f-11ee-8477-4312413938e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.168
+ 100.64.19.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702427618
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 423b6940-994f-11ee-8477-4312413938e1
+
+
+
diff --git a/graph/incidents_graphml/4/423c3d30-d553-11ee-9e46-fb4031711de5.graphml b/graph/incidents_graphml/4/423c3d30-d553-11ee-9e46-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f66a0ad8cdd75c5ff133d0548fe02950b1dce75
--- /dev/null
+++ b/graph/incidents_graphml/4/423c3d30-d553-11ee-9e46-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.197
+ 100.64.22.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709026406
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 423c3d30-d553-11ee-9e46-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/4/423d7fb0-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/4/423d7fb0-02ef-11ee-800b-d36f3c94df97.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ad3659b4b4164d1619ae11a7127324030575c39
--- /dev/null
+++ b/graph/incidents_graphml/4/423d7fb0-02ef-11ee-800b-d36f3c94df97.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.135
+ 100.64.52.135
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.70.245
+ 100.64.70.245
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.23.29
+ 100.64.23.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685893712
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 423d7fb0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893712
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 423d7fb0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893712
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 423d7fb0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893712
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 423d7fb0-02ef-11ee-800b-d36f3c94df97
+
+
+
diff --git a/graph/incidents_graphml/4/424a2dd0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/424a2dd0-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3a87c3f3b35acc30a4f7cfff0b558ad8e274d84
--- /dev/null
+++ b/graph/incidents_graphml/4/424a2dd0-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.175
+ 100.64.53.175
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475189
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 424a2dd0-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/4/424c3ac0-ed63-11ec-9115-b3a5268a4818.graphml b/graph/incidents_graphml/4/424c3ac0-ed63-11ec-9115-b3a5268a4818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c737b193f26f9a18b10008289d44195ee88ae806
--- /dev/null
+++ b/graph/incidents_graphml/4/424c3ac0-ed63-11ec-9115-b3a5268a4818.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.34.37
+ USER-0015-1761.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.161
+ 100.64.77.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655377111
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 424c3ac0-ed63-11ec-9115-b3a5268a4818
+
+
+ INCIDENT_LINK
+ 1655377111
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 424c3ac0-ed63-11ec-9115-b3a5268a4818
+
+
+
diff --git a/graph/incidents_graphml/4/4251e750-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/4251e750-2768-11ee-b240-577a40e6eef6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..778e045c14ee13385c6f427267a7fee9b50a9dd8
--- /dev/null
+++ b/graph/incidents_graphml/4/4251e750-2768-11ee-b240-577a40e6eef6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.22
+ 100.64.19.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689903923
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4251e750-2768-11ee-b240-577a40e6eef6
+
+
+
diff --git a/graph/incidents_graphml/4/425b5ba0-4e14-11ee-a329-837d93fb4fa8.graphml b/graph/incidents_graphml/4/425b5ba0-4e14-11ee-a329-837d93fb4fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9af39ed6db8de119bfa558e60c5f82fce0b8e27c
--- /dev/null
+++ b/graph/incidents_graphml/4/425b5ba0-4e14-11ee-a329-837d93fb4fa8.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.66
+ 100.64.37.66
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.158
+ 100.64.15.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.57
+ USER-0015-1203.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.8
+ 100.64.23.8
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.168
+ 100.64.6.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.67
+ 100.64.37.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.68
+ 100.64.37.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.69
+ 100.64.37.69
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.242
+ 100.64.11.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.221
+ 100.64.13.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.47
+ 100.64.11.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.70
+ 100.64.37.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.71
+ 100.64.37.71
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.72
+ 100.64.37.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.73
+ 100.64.37.73
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.74
+ 100.64.37.74
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.75
+ 100.64.37.75
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155941
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 425b5ba0-4e14-11ee-a329-837d93fb4fa8
+
+
+
diff --git a/graph/incidents_graphml/4/426a5150-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/426a5150-2768-11ee-b240-577a40e6eef6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f1590d0a203e64a6c37dd24a6af194ddebbd4a8
--- /dev/null
+++ b/graph/incidents_graphml/4/426a5150-2768-11ee-b240-577a40e6eef6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.22
+ 100.64.19.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689903924
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 426a5150-2768-11ee-b240-577a40e6eef6
+
+
+
diff --git a/graph/incidents_graphml/4/42793dd0-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/42793dd0-3b39-11ed-8f70-4f50899684e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..02ac1f464e900692f352e4742c1737625594fc57
--- /dev/null
+++ b/graph/incidents_graphml/4/42793dd0-3b39-11ed-8f70-4f50899684e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.84.239
+ 100.64.84.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663935263
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 42793dd0-3b39-11ed-8f70-4f50899684e5
+
+
+
diff --git a/graph/incidents_graphml/4/427c03c0-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/4/427c03c0-50c0-11ed-875b-db834c6ab2cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86bfc9d1b3cf5d861aa31dccc5c0c59409b9935d
--- /dev/null
+++ b/graph/incidents_graphml/4/427c03c0-50c0-11ed-875b-db834c6ab2cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.222
+ 100.64.29.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1666302219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 427c03c0-50c0-11ed-875b-db834c6ab2cd
+
+
+
diff --git a/graph/incidents_graphml/4/427d0e60-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/427d0e60-3b39-11ed-8f70-4f50899684e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4557ca8e8a72423bee298453c02998006dc9fbe
--- /dev/null
+++ b/graph/incidents_graphml/4/427d0e60-3b39-11ed-8f70-4f50899684e5.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.48
+ 100.64.94.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663935263
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 427d0e60-3b39-11ed-8f70-4f50899684e5
+
+
+ INCIDENT_LINK
+ 1663935263
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 427d0e60-3b39-11ed-8f70-4f50899684e5
+
+
+
diff --git a/graph/incidents_graphml/4/427f8630-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/4/427f8630-50c0-11ed-875b-db834c6ab2cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4c836bf9f57eef7142c0e72cefbcabc039eb129
--- /dev/null
+++ b/graph/incidents_graphml/4/427f8630-50c0-11ed-875b-db834c6ab2cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.29.222
+ 100.64.29.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1666302219
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 427f8630-50c0-11ed-875b-db834c6ab2cd
+
+
+
diff --git a/graph/incidents_graphml/4/42839e10-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/42839e10-3b39-11ed-8f70-4f50899684e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..89932698b249a0a264208dc24f71059b2675a833
--- /dev/null
+++ b/graph/incidents_graphml/4/42839e10-3b39-11ed-8f70-4f50899684e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.48
+ 100.64.94.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663935263
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 42839e10-3b39-11ed-8f70-4f50899684e5
+
+
+
diff --git a/graph/incidents_graphml/4/428a5c70-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/428a5c70-2768-11ee-b240-577a40e6eef6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e00b4aa1760723e1c28e3f78d104f5ca627f6c57
--- /dev/null
+++ b/graph/incidents_graphml/4/428a5c70-2768-11ee-b240-577a40e6eef6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.22
+ 100.64.19.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689903924
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 428a5c70-2768-11ee-b240-577a40e6eef6
+
+
+
diff --git a/graph/incidents_graphml/4/428c77b0-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/428c77b0-3b39-11ed-8f70-4f50899684e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e19cc162c6682648439fed2330376e8910be6b0d
--- /dev/null
+++ b/graph/incidents_graphml/4/428c77b0-3b39-11ed-8f70-4f50899684e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.242
+ 100.64.90.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1663935263
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 428c77b0-3b39-11ed-8f70-4f50899684e5
+
+
+
diff --git a/graph/incidents_graphml/4/42903960-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/42903960-13f8-11ef-b4e0-63669a8fd788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4122ac7708d222fe55460069abcd1316b0717f8
--- /dev/null
+++ b/graph/incidents_graphml/4/42903960-13f8-11ef-b4e0-63669a8fd788.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.153
+ 100.64.31.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715914246
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 42903960-13f8-11ef-b4e0-63669a8fd788
+
+
+
diff --git a/graph/incidents_graphml/4/42932e70-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/42932e70-3b39-11ed-8f70-4f50899684e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0683ff01b59b47f7b7c8a6d5ed5d8801a26836ab
--- /dev/null
+++ b/graph/incidents_graphml/4/42932e70-3b39-11ed-8f70-4f50899684e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.73.112
+ 100.64.73.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663935263
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 42932e70-3b39-11ed-8f70-4f50899684e5
+
+
+
diff --git a/graph/incidents_graphml/4/4297cf50-f918-11ed-ad0a-4f26fc6f2b7f.graphml b/graph/incidents_graphml/4/4297cf50-f918-11ed-ad0a-4f26fc6f2b7f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e479cce4c066169401bf0113de7eb14cc40af592
--- /dev/null
+++ b/graph/incidents_graphml/4/4297cf50-f918-11ed-ad0a-4f26fc6f2b7f.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.4
+ 100.64.18.4
+ []
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.5
+ 100.64.18.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.22
+ 100.64.14.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.6
+ 100.64.18.6
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.7
+ 100.64.18.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.8
+ 100.64.18.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.9
+ 100.64.18.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.10
+ 100.64.18.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+ INCIDENT_LINK
+ 1684811811
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4297cf50-f918-11ed-ad0a-4f26fc6f2b7f
+
+
+
diff --git a/graph/incidents_graphml/4/4298bd20-999f-11ee-9648-fdeb01eb2c83.graphml b/graph/incidents_graphml/4/4298bd20-999f-11ee-9648-fdeb01eb2c83.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c63f271ce34981f8b650c947ecf2609f7f38da00
--- /dev/null
+++ b/graph/incidents_graphml/4/4298bd20-999f-11ee-9648-fdeb01eb2c83.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702461979
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4298bd20-999f-11ee-9648-fdeb01eb2c83
+
+
+
diff --git a/graph/incidents_graphml/4/42a66ff0-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/42a66ff0-2768-11ee-b240-577a40e6eef6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f82693c73f09bda524615bef68a990f6e62590b2
--- /dev/null
+++ b/graph/incidents_graphml/4/42a66ff0-2768-11ee-b240-577a40e6eef6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.22
+ 100.64.19.22
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689903924
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 42a66ff0-2768-11ee-b240-577a40e6eef6
+
+
+
diff --git a/graph/incidents_graphml/4/42a88b30-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/42a88b30-3b39-11ed-8f70-4f50899684e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1068d988a5a9aa5cea169736a586bdc3dbe2980c
--- /dev/null
+++ b/graph/incidents_graphml/4/42a88b30-3b39-11ed-8f70-4f50899684e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.2
+ 100.64.69.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663935263
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42a88b30-3b39-11ed-8f70-4f50899684e5
+
+
+
diff --git a/graph/incidents_graphml/4/42af41f0-3b39-11ed-8f70-4f50899684e5.graphml b/graph/incidents_graphml/4/42af41f0-3b39-11ed-8f70-4f50899684e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..540f4970da6497c588624d351d16a411520fd45e
--- /dev/null
+++ b/graph/incidents_graphml/4/42af41f0-3b39-11ed-8f70-4f50899684e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.69.2
+ 100.64.69.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1663935263
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 42af41f0-3b39-11ed-8f70-4f50899684e5
+
+
+
diff --git a/graph/incidents_graphml/4/42b0be40-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/4/42b0be40-81bf-11ee-967b-47c68907a0bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c367fe9c3bb682204011c09821d883b100fff3f5
--- /dev/null
+++ b/graph/incidents_graphml/4/42b0be40-81bf-11ee-967b-47c68907a0bd.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.155
+ 100.64.68.155
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.156
+ USER-0015-1508.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1699836895
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 42b0be40-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699836895
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 42b0be40-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699836895
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 42b0be40-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699836895
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 42b0be40-81bf-11ee-967b-47c68907a0bd
+
+
+
diff --git a/graph/incidents_graphml/4/42b15a80-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/4/42b15a80-81bf-11ee-967b-47c68907a0bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10afe7c27cdb7471bf06f563a15ac43eb218b3bf
--- /dev/null
+++ b/graph/incidents_graphml/4/42b15a80-81bf-11ee-967b-47c68907a0bd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.157
+ 100.64.68.157
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1699836895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42b15a80-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699836895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42b15a80-81bf-11ee-967b-47c68907a0bd
+
+
+
diff --git a/graph/incidents_graphml/4/42c569a0-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/42c569a0-2768-11ee-b240-577a40e6eef6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..651248e4f6e6a8ba0eb51b3935fbd42ba35ece00
--- /dev/null
+++ b/graph/incidents_graphml/4/42c569a0-2768-11ee-b240-577a40e6eef6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.117
+ 100.64.18.117
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689903924
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 42c569a0-2768-11ee-b240-577a40e6eef6
+
+
+
diff --git a/graph/incidents_graphml/4/42c65ae0-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/4/42c65ae0-82f8-11ee-9f73-dbbba1248bb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26cbf87e3e605492a10a9b0234be966cfc9d2cc6
--- /dev/null
+++ b/graph/incidents_graphml/4/42c65ae0-82f8-11ee-9f73-dbbba1248bb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.220
+ 100.64.15.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699971327
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 42c65ae0-82f8-11ee-9f73-dbbba1248bb5
+
+
+
diff --git a/graph/incidents_graphml/4/42df3a10-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/4/42df3a10-82f8-11ee-9f73-dbbba1248bb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2238b69bcd97d78b040e7182794d08be6c9a9594
--- /dev/null
+++ b/graph/incidents_graphml/4/42df3a10-82f8-11ee-9f73-dbbba1248bb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.3
+ 100.64.39.3
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699971328
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42df3a10-82f8-11ee-9f73-dbbba1248bb5
+
+
+
diff --git a/graph/incidents_graphml/4/42dfd090-eb96-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/4/42dfd090-eb96-11ee-8f3a-6b2412cfa52f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85b7409e192f91ca06635600fc4750f08b7d7d2f
--- /dev/null
+++ b/graph/incidents_graphml/4/42dfd090-eb96-11ee-8f3a-6b2412cfa52f.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.22.206
+ 10.113.22.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Vulnerability Management","Windows Active Directory"]
+
+
+ HOST
+ 100.64.70.12
+ 100.64.70.12
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.13
+ 100.64.70.13
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.14
+ 100.64.70.14
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711474109
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42dfd090-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474109
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42dfd090-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474109
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42dfd090-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474109
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42dfd090-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474109
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42dfd090-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474109
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42dfd090-eb96-11ee-8f3a-6b2412cfa52f
+
+
+
diff --git a/graph/incidents_graphml/4/42e47940-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/42e47940-4e4a-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..463d7fc6bc7a14c2969afe586c752ca10c1fc6e4
--- /dev/null
+++ b/graph/incidents_graphml/4/42e47940-4e4a-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.101
+ 100.64.58.101
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694179135
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42e47940-4e4a-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/4/42eaccb0-d553-11ee-9e46-fb4031711de5.graphml b/graph/incidents_graphml/4/42eaccb0-d553-11ee-9e46-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5dbcfaf99f393c2f7ce1c886fb4620a87fb29f64
--- /dev/null
+++ b/graph/incidents_graphml/4/42eaccb0-d553-11ee-9e46-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.226
+ 100.64.46.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709026407
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 42eaccb0-d553-11ee-9e46-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/4/42ebe3a0-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/4/42ebe3a0-1f34-11ee-bd83-b52c9cbf0232.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5338a2d695198b1a8ea996a51b74c8daa56b43fc
--- /dev/null
+++ b/graph/incidents_graphml/4/42ebe3a0-1f34-11ee-bd83-b52c9cbf0232.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.39
+ 100.64.77.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.114
+ 100.64.71.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689001981
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 42ebe3a0-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001981
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 42ebe3a0-1f34-11ee-bd83-b52c9cbf0232
+
+
+
diff --git a/graph/incidents_graphml/4/42ed1cc0-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/4/42ed1cc0-82f8-11ee-9f73-dbbba1248bb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9496e5239259cc44ea2b2d8dca72fde3cca4e54
--- /dev/null
+++ b/graph/incidents_graphml/4/42ed1cc0-82f8-11ee-9f73-dbbba1248bb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.3
+ 100.64.39.3
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699971328
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 42ed1cc0-82f8-11ee-9f73-dbbba1248bb5
+
+
+
diff --git a/graph/incidents_graphml/4/42fb3590-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/42fb3590-4e4a-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5002b24a0e674fc011d8c28cb9f8775683fc65b5
--- /dev/null
+++ b/graph/incidents_graphml/4/42fb3590-4e4a-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.101
+ 100.64.58.101
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694179135
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 42fb3590-4e4a-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/4/42fb6e80-d553-11ee-9e46-fb4031711de5.graphml b/graph/incidents_graphml/4/42fb6e80-d553-11ee-9e46-fb4031711de5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b0df665537f2eb14a313caa20fd3898e467f8af
--- /dev/null
+++ b/graph/incidents_graphml/4/42fb6e80-d553-11ee-9e46-fb4031711de5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.226
+ 100.64.46.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709026407
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 42fb6e80-d553-11ee-9e46-fb4031711de5
+
+
+
diff --git a/graph/incidents_graphml/4/430781f0-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/4/430781f0-1f34-11ee-bd83-b52c9cbf0232.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b743a25c5600168be56b734159ebf1291cea0b9
--- /dev/null
+++ b/graph/incidents_graphml/4/430781f0-1f34-11ee-bd83-b52c9cbf0232.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.36
+ 100.64.30.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.137
+ 100.64.74.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689001981
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 430781f0-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001981
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 430781f0-1f34-11ee-bd83-b52c9cbf0232
+
+
+
diff --git a/graph/incidents_graphml/4/43087000-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/4/43087000-b4ff-11ed-bb53-cb33bcdbc12a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87ba8b139252b21869d284392e327bfe4ba33e63
--- /dev/null
+++ b/graph/incidents_graphml/4/43087000-b4ff-11ed-bb53-cb33bcdbc12a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.58
+ 100.64.80.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.222
+ 100.64.71.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677324395
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43087000-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324395
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43087000-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+
diff --git a/graph/incidents_graphml/4/4309cf90-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/4/4309cf90-b4ff-11ed-bb53-cb33bcdbc12a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad41e06479462eb7469b491fd656d9333f56b870
--- /dev/null
+++ b/graph/incidents_graphml/4/4309cf90-b4ff-11ed-bb53-cb33bcdbc12a.graphml
@@ -0,0 +1,121 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.82
+ 100.64.71.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.80.48
+ 100.64.80.48
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.173
+ 100.64.72.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677324395
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4309cf90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324395
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4309cf90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324395
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4309cf90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324395
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4309cf90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+
diff --git a/graph/incidents_graphml/4/430ae290-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/4/430ae290-2f75-11ee-b11e-87149c94e410.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b453bc613e165ff17a843106e8ff101dbfc156c
--- /dev/null
+++ b/graph/incidents_graphml/4/430ae290-2f75-11ee-b11e-87149c94e410.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.252
+ 100.64.41.252
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.253
+ 100.64.41.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.254
+ 100.64.41.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.255
+ 100.64.41.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.1
+ 100.64.42.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.1
+ 100.64.42.1
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.2
+ 100.64.42.2
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.3
+ 100.64.42.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.4
+ 100.64.42.4
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.187
+ 100.64.13.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.5
+ 100.64.42.5
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.6
+ 100.64.42.6
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.7
+ 100.64.42.7
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.8
+ 100.64.42.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.9
+ 100.64.42.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.10
+ 100.64.42.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.253
+ 100.64.18.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789117
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ae290-2f75-11ee-b11e-87149c94e410
+
+
+
diff --git a/graph/incidents_graphml/4/430ffdb0-0e2e-11ee-bc7f-2529405b1969.graphml b/graph/incidents_graphml/4/430ffdb0-0e2e-11ee-bc7f-2529405b1969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f30665d78f12613ed703bc6300cbe57f6a20a525
--- /dev/null
+++ b/graph/incidents_graphml/4/430ffdb0-0e2e-11ee-bc7f-2529405b1969.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.33
+ HOST-15454
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.55.36
+ 100.64.55.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687130235
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ffdb0-0e2e-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130235
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 430ffdb0-0e2e-11ee-bc7f-2529405b1969
+
+
+
diff --git a/graph/incidents_graphml/4/431637a0-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/431637a0-33c8-11ef-bc42-75e180de3d4b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..040dbcbd7a75817e46ced0d711e7d1e7bd3b91e8
--- /dev/null
+++ b/graph/incidents_graphml/4/431637a0-33c8-11ef-bc42-75e180de3d4b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.124.113.55
+ 10.124.113.55
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.249.219
+ 172.27.249.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.246.119
+ 172.16.246.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719412068
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 431637a0-33c8-11ef-bc42-75e180de3d4b
+
+
+ INCIDENT_LINK
+ 1719412068
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 431637a0-33c8-11ef-bc42-75e180de3d4b
+
+
+ INCIDENT_LINK
+ 1719412068
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 431637a0-33c8-11ef-bc42-75e180de3d4b
+
+
+ INCIDENT_LINK
+ 1719412068
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 431637a0-33c8-11ef-bc42-75e180de3d4b
+
+
+
diff --git a/graph/incidents_graphml/4/43232af0-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/43232af0-41f3-11ed-a891-2d9e83e3a063.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce6888f1c03f9424d18112891de58983ed2d9ebc
--- /dev/null
+++ b/graph/incidents_graphml/4/43232af0-41f3-11ed-a891-2d9e83e3a063.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.195.227
+ 172.21.195.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.57
+ 100.64.94.57
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.168
+ 100.64.86.168
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1664674857
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43232af0-41f3-11ed-a891-2d9e83e3a063
+
+
+ INCIDENT_LINK
+ 1664674857
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43232af0-41f3-11ed-a891-2d9e83e3a063
+
+
+ INCIDENT_LINK
+ 1664674857
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43232af0-41f3-11ed-a891-2d9e83e3a063
+
+
+ INCIDENT_LINK
+ 1664674857
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43232af0-41f3-11ed-a891-2d9e83e3a063
+
+
+
diff --git a/graph/incidents_graphml/4/43275560-6e59-11ee-bd33-e97c9a557859.graphml b/graph/incidents_graphml/4/43275560-6e59-11ee-bd33-e97c9a557859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d984597fc92831ffca526d85b33cf211af9c826c
--- /dev/null
+++ b/graph/incidents_graphml/4/43275560-6e59-11ee-bd33-e97c9a557859.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.41
+ 100.64.40.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.42
+ 100.64.40.42
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.43
+ 100.64.40.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.246
+ 100.64.19.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.44
+ 100.64.40.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.112
+ 100.64.8.112
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.45
+ 100.64.40.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.46
+ 100.64.40.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.218
+ 100.64.30.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.104
+ 100.64.15.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.224
+ 100.64.17.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.47
+ 100.64.40.47
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.48
+ 100.64.40.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.203
+ 100.64.12.203
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.49
+ 100.64.40.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.50
+ 100.64.40.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.142
+ 100.64.28.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.219
+ 100.64.35.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704015
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43275560-6e59-11ee-bd33-e97c9a557859
+
+
+
diff --git a/graph/incidents_graphml/4/432b7e70-2768-11ee-b240-577a40e6eef6.graphml b/graph/incidents_graphml/4/432b7e70-2768-11ee-b240-577a40e6eef6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41a1cf28dcb16d6a1defc6755571008b2c4c983b
--- /dev/null
+++ b/graph/incidents_graphml/4/432b7e70-2768-11ee-b240-577a40e6eef6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.22
+ 100.64.14.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689903925
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 432b7e70-2768-11ee-b240-577a40e6eef6
+
+
+
diff --git a/graph/incidents_graphml/4/432defb0-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/4/432defb0-4dd9-11ee-b3c2-8d33e6517b90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..75097e30cc4c8c30909ae0359657f90714d4601f
--- /dev/null
+++ b/graph/incidents_graphml/4/432defb0-4dd9-11ee-b3c2-8d33e6517b90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.167
+ 100.64.20.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694130602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 432defb0-4dd9-11ee-b3c2-8d33e6517b90
+
+
+
diff --git a/graph/incidents_graphml/4/43337c60-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/43337c60-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba6c5b1001b58b0ddc71d8c9de209d8b92837e3f
--- /dev/null
+++ b/graph/incidents_graphml/4/43337c60-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,815 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.45
+ 100.64.47.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.62
+ 100.64.26.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.217
+ 100.64.31.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.80
+ 100.64.8.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.177
+ 100.64.53.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.178
+ 100.64.53.178
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.179
+ 100.64.53.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.23
+ 100.64.28.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.202
+ 100.64.12.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.180
+ 100.64.53.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.194
+ 100.64.29.194
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.181
+ 100.64.53.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.104
+ 100.64.32.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.182
+ 100.64.53.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.247
+ 100.64.23.247
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.228
+ 100.64.6.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43337c60-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/4/433dce30-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/4/433dce30-4dd9-11ee-b3c2-8d33e6517b90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7acab01e5f660c8e7a57ddfb7f4a479fe6155812
--- /dev/null
+++ b/graph/incidents_graphml/4/433dce30-4dd9-11ee-b3c2-8d33e6517b90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.167
+ 100.64.20.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694130602
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 433dce30-4dd9-11ee-b3c2-8d33e6517b90
+
+
+
diff --git a/graph/incidents_graphml/4/43450890-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/43450890-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d522a03596f6ff7cb9f581e0a78b61be2026c7ef
--- /dev/null
+++ b/graph/incidents_graphml/4/43450890-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.45
+ 100.64.47.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475190
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43450890-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/4/43472870-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/43472870-850d-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..522f77cd544e67437611f485b4018ee91e2b882f
--- /dev/null
+++ b/graph/incidents_graphml/4/43472870-850d-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.180
+ 100.64.5.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700200250
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43472870-850d-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/4/4355ce70-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/4355ce70-850d-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..89a0311492625bfe0c92c9197c0f69e34cb75b02
--- /dev/null
+++ b/graph/incidents_graphml/4/4355ce70-850d-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.180
+ 100.64.5.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700200250
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4355ce70-850d-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/4/4355d440-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/4/4355d440-2f33-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4e9a6f794583999013c30d1b7a9afee89e5b4c8
--- /dev/null
+++ b/graph/incidents_graphml/4/4355d440-2f33-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.50
+ 100.64.82.50
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.243
+ 100.64.71.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.231
+ 100.64.10.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690760771
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4355d440-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760771
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4355d440-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760771
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4355d440-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760771
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4355d440-2f33-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/4/4357d970-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/4357d970-becc-11ed-93f3-fff421178c5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..077df14b3563f3a4022df415b246dfa52cae8f81
--- /dev/null
+++ b/graph/incidents_graphml/4/4357d970-becc-11ed-93f3-fff421178c5e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.135
+ 100.64.94.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678402003
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4357d970-becc-11ed-93f3-fff421178c5e
+
+
+
diff --git a/graph/incidents_graphml/4/435b82f0-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/435b82f0-becc-11ed-93f3-fff421178c5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6cc62f2987cbe90372e9d68ccde00497186a54e
--- /dev/null
+++ b/graph/incidents_graphml/4/435b82f0-becc-11ed-93f3-fff421178c5e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.135
+ 100.64.94.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678402003
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 435b82f0-becc-11ed-93f3-fff421178c5e
+
+
+
diff --git a/graph/incidents_graphml/4/43612840-becc-11ed-93f3-fff421178c5e.graphml b/graph/incidents_graphml/4/43612840-becc-11ed-93f3-fff421178c5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18ea45c8d2a433b8371c2c34678ae9a3b4f5d44e
--- /dev/null
+++ b/graph/incidents_graphml/4/43612840-becc-11ed-93f3-fff421178c5e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.17.250
+ 100.64.17.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678402003
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 43612840-becc-11ed-93f3-fff421178c5e
+
+
+
diff --git a/graph/incidents_graphml/4/4365b520-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4365b520-9fb5-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..158a2b4a79f1ab2be692d8d4c2c61423d1494a97
--- /dev/null
+++ b/graph/incidents_graphml/4/4365b520-9fb5-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.253
+ 100.64.10.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703131136
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4365b520-9fb5-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/4374f760-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4374f760-9fb5-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb7b9c7292a9b66cf6f00261ce112ccf79e05fa3
--- /dev/null
+++ b/graph/incidents_graphml/4/4374f760-9fb5-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.253
+ 100.64.10.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703131136
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4374f760-9fb5-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/43863930-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/43863930-631f-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e9d4b8cdc4dc8239fff4bca6d443fd48a89d267
--- /dev/null
+++ b/graph/incidents_graphml/4/43863930-631f-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.207
+ 100.64.18.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696469642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 43863930-631f-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/4/438d48a0-9183-11ee-afab-0bead911b18a.graphml b/graph/incidents_graphml/4/438d48a0-9183-11ee-afab-0bead911b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae0d252a21a1e7f6ea4ea2650a2cc4fc308899ab
--- /dev/null
+++ b/graph/incidents_graphml/4/438d48a0-9183-11ee-afab-0bead911b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.191
+ 100.64.10.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701570345
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 438d48a0-9183-11ee-afab-0bead911b18a
+
+
+
diff --git a/graph/incidents_graphml/4/4394d830-b133-11ed-8c7d-65e7f37a4d8d.graphml b/graph/incidents_graphml/4/4394d830-b133-11ed-8c7d-65e7f37a4d8d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..289eec3d2674391e2348918810a4d962ad756f49
--- /dev/null
+++ b/graph/incidents_graphml/4/4394d830-b133-11ed-8c7d-65e7f37a4d8d.graphml
@@ -0,0 +1,62 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ CRED
+ CRED-0012
+ ["Suspicious User"]
+ 0.625
+ ["Windows Logs"]
+
+
+ HOST
+ 100.64.83.238
+ HOST-16825
+ ["Exploiting Host"]
+ 0.71875
+ ["Precinct"]
+
+
+ INCIDENT_LINK
+ 1676906925
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4394d830-b133-11ed-8c7d-65e7f37a4d8d
+
+
+
diff --git a/graph/incidents_graphml/4/43952d50-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/43952d50-631f-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a28d00b6d12435f290573d94684f1e8e4e61f59
--- /dev/null
+++ b/graph/incidents_graphml/4/43952d50-631f-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.207
+ 100.64.18.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696469642
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43952d50-631f-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/4/439c15b0-9183-11ee-afab-0bead911b18a.graphml b/graph/incidents_graphml/4/439c15b0-9183-11ee-afab-0bead911b18a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..555f14c9d2dc1623fe219fb511553f3a9073f7b9
--- /dev/null
+++ b/graph/incidents_graphml/4/439c15b0-9183-11ee-afab-0bead911b18a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.191
+ 100.64.10.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701570345
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 439c15b0-9183-11ee-afab-0bead911b18a
+
+
+
diff --git a/graph/incidents_graphml/4/43a40bd0-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/43a40bd0-7090-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1e08c78149dcabe529e7f9b348f0f53bfa643c0
--- /dev/null
+++ b/graph/incidents_graphml/4/43a40bd0-7090-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.5
+ 100.64.39.5
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697947540
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43a40bd0-7090-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/43b18cf0-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/43b18cf0-d383-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45951ff8e50068192ed3e5120d70fca039bc3adf
--- /dev/null
+++ b/graph/incidents_graphml/4/43b18cf0-d383-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.235
+ 100.64.31.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708827122
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43b18cf0-d383-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/43b4d4b0-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/43b4d4b0-7090-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d36bb64bd72f6db1aa85bc07ac71498cfec290fc
--- /dev/null
+++ b/graph/incidents_graphml/4/43b4d4b0-7090-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.7
+ 100.64.39.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697947540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 43b4d4b0-7090-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/43b7a710-56b6-11ee-be44-f1fe26834d88.graphml b/graph/incidents_graphml/4/43b7a710-56b6-11ee-be44-f1fe26834d88.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6d1045cbf5b1f07528a832e5b4d7c3ee4d2049e
--- /dev/null
+++ b/graph/incidents_graphml/4/43b7a710-56b6-11ee-be44-f1fe26834d88.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.35
+ 100.64.43.35
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.50
+ 100.64.69.50
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.51
+ 100.64.69.51
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695105131
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43b7a710-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105131
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43b7a710-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105131
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43b7a710-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105131
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43b7a710-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105131
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43b7a710-56b6-11ee-be44-f1fe26834d88
+
+
+ INCIDENT_LINK
+ 1695105131
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43b7a710-56b6-11ee-be44-f1fe26834d88
+
+
+
diff --git a/graph/incidents_graphml/4/43b98460-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/4/43b98460-f25b-11ec-b513-c302b572dea2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4dc571c7473888f817e0ef458991a8105a874dd8
--- /dev/null
+++ b/graph/incidents_graphml/4/43b98460-f25b-11ec-b513-c302b572dea2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.32
+ USER-0015-1856.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.86
+ 100.64.76.86
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655923433
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 43b98460-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923433
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 43b98460-f25b-11ec-b513-c302b572dea2
+
+
+
diff --git a/graph/incidents_graphml/4/43c36f70-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/4/43c36f70-f25b-11ec-b513-c302b572dea2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..922088f73361a307def617dd7065af968ee1295e
--- /dev/null
+++ b/graph/incidents_graphml/4/43c36f70-f25b-11ec-b513-c302b572dea2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.33
+ USER-0015-1857.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655923433
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 43c36f70-f25b-11ec-b513-c302b572dea2
+
+
+
diff --git a/graph/incidents_graphml/4/43c57680-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/43c57680-7090-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..548c3a2b7e04643a7afd996a56e013d04d759bea
--- /dev/null
+++ b/graph/incidents_graphml/4/43c57680-7090-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.7
+ 100.64.39.7
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697947541
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43c57680-7090-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/43c57bd0-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/43c57bd0-62c1-11ee-b24d-ffed8a6ae3b7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8b7ea133d66bab155759d031e1982cebd506675
--- /dev/null
+++ b/graph/incidents_graphml/4/43c57bd0-62c1-11ee-b24d-ffed8a6ae3b7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.213
+ 100.64.23.213
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696429270
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43c57bd0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+
diff --git a/graph/incidents_graphml/4/43cd7160-0938-11ee-a886-17db84346526.graphml b/graph/incidents_graphml/4/43cd7160-0938-11ee-a886-17db84346526.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..652c31194f74c844e48023768e02014413eb62e4
--- /dev/null
+++ b/graph/incidents_graphml/4/43cd7160-0938-11ee-a886-17db84346526.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.169
+ 100.64.26.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.54
+ USER-0015-1420.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.90
+ 100.64.57.90
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686584775
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43cd7160-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584775
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43cd7160-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584775
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43cd7160-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584775
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43cd7160-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584775
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43cd7160-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584775
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43cd7160-0938-11ee-a886-17db84346526
+
+
+
diff --git a/graph/incidents_graphml/4/43cfa470-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/4/43cfa470-f25b-11ec-b513-c302b572dea2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..941b594c318badf81291061342a6305f50ba6540
--- /dev/null
+++ b/graph/incidents_graphml/4/43cfa470-f25b-11ec-b513-c302b572dea2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.33
+ USER-0015-1857.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655923433
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 43cfa470-f25b-11ec-b513-c302b572dea2
+
+
+
diff --git a/graph/incidents_graphml/4/43d98fc0-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/4/43d98fc0-589f-11ee-a130-b3fc4de2b604.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe5f07a72de7398885641f7435346412c5ced00a
--- /dev/null
+++ b/graph/incidents_graphml/4/43d98fc0-589f-11ee-a130-b3fc4de2b604.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.17.249.2
+ 172.17.249.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.130
+ 100.64.91.130
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695315155
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43d98fc0-589f-11ee-a130-b3fc4de2b604
+
+
+ INCIDENT_LINK
+ 1695315155
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43d98fc0-589f-11ee-a130-b3fc4de2b604
+
+
+
diff --git a/graph/incidents_graphml/4/43e14890-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/43e14890-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c342c22af6ca4590e735af2bb4c3b5439523683b
--- /dev/null
+++ b/graph/incidents_graphml/4/43e14890-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,675 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.191
+ 100.64.53.191
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.105
+ 100.64.28.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.76
+ 100.64.37.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.192
+ 100.64.53.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.193
+ 100.64.53.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.9
+ 100.64.22.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.194
+ 100.64.53.194
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.195
+ 100.64.53.195
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.253
+ 100.64.14.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.196
+ 100.64.53.196
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.197
+ 100.64.53.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.70
+ 100.64.20.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.187
+ 100.64.44.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.198
+ 100.64.53.198
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.162
+ 100.64.35.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.251
+ 100.64.13.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.61
+ 100.64.50.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 43e14890-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/4/43e17180-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/43e17180-13f8-11ef-b4e0-63669a8fd788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95efecc0fa0d1f2a45eb876080b5f5f80cb9d656
--- /dev/null
+++ b/graph/incidents_graphml/4/43e17180-13f8-11ef-b4e0-63669a8fd788.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.65
+ 100.64.31.65
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715914248
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 43e17180-13f8-11ef-b4e0-63669a8fd788
+
+
+
diff --git a/graph/incidents_graphml/4/43f1c350-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/43f1c350-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4dfba3046a55bd6e698af9207f787edb0be0ba55
--- /dev/null
+++ b/graph/incidents_graphml/4/43f1c350-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.116
+ 100.64.8.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475191
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 43f1c350-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/4/43f2d6a0-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/43f2d6a0-13f8-11ef-b4e0-63669a8fd788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3863861f0022d45e09c74e114d81f287f44a4f8
--- /dev/null
+++ b/graph/incidents_graphml/4/43f2d6a0-13f8-11ef-b4e0-63669a8fd788.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.65
+ 100.64.31.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715914248
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 43f2d6a0-13f8-11ef-b4e0-63669a8fd788
+
+
+
diff --git a/graph/incidents_graphml/4/43f7a5c0-7437-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/4/43f7a5c0-7437-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..965584c419b833f3aca83b4f22c19dca87c116ee
--- /dev/null
+++ b/graph/incidents_graphml/4/43f7a5c0-7437-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.142
+ 100.64.71.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.248
+ 100.64.70.248
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1670201623
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 43f7a5c0-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201623
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 43f7a5c0-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201623
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 43f7a5c0-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201623
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 43f7a5c0-7437-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/4/43ff8570-e2a3-11ee-8bca-5190faa7db82.graphml b/graph/incidents_graphml/4/43ff8570-e2a3-11ee-8bca-5190faa7db82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a58c4adea32d16ada9d5dbd380f0985cc9ba1aa3
--- /dev/null
+++ b/graph/incidents_graphml/4/43ff8570-e2a3-11ee-8bca-5190faa7db82.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.181
+ 100.64.34.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1710490134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 43ff8570-e2a3-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490134
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 43ff8570-e2a3-11ee-8bca-5190faa7db82
+
+
+
diff --git a/graph/incidents_graphml/4/4401c8e0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/4401c8e0-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..47825887b2bc780b75ab6d44d48f8fe06414f56b
--- /dev/null
+++ b/graph/incidents_graphml/4/4401c8e0-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.116
+ 100.64.8.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475192
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4401c8e0-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/4/44166250-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/44166250-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8170be40ea0ffc30135027fdb01d18b42bcc820
--- /dev/null
+++ b/graph/incidents_graphml/4/44166250-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.116
+ 100.64.24.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475192
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44166250-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/4/441718f0-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/441718f0-7090-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1177c88a7a8a89c3489fa79595c60e234569af0c
--- /dev/null
+++ b/graph/incidents_graphml/4/441718f0-7090-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.166
+ 100.64.36.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697947541
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 441718f0-7090-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/4427bac0-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4427bac0-7090-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..673ed5a972b1c9373a07e853a43a8dd3d9347dc2
--- /dev/null
+++ b/graph/incidents_graphml/4/4427bac0-7090-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.166
+ 100.64.36.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697947541
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4427bac0-7090-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/442de1f0-47e3-11ee-b585-ebe535390ebf.graphml b/graph/incidents_graphml/4/442de1f0-47e3-11ee-b585-ebe535390ebf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88e7fa4585506330b6e170ac768df0123895acaa
--- /dev/null
+++ b/graph/incidents_graphml/4/442de1f0-47e3-11ee-b585-ebe535390ebf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.116
+ 100.64.24.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693475192
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 442de1f0-47e3-11ee-b585-ebe535390ebf
+
+
+
diff --git a/graph/incidents_graphml/4/4430a340-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/4430a340-5909-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eaf133dd5c7b99384816734f3fa2ff3e1aadf72e
--- /dev/null
+++ b/graph/incidents_graphml/4/4430a340-5909-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.245
+ 100.64.60.245
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360682
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4430a340-5909-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/4/44341bb0-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/4/44341bb0-82f8-11ee-9f73-dbbba1248bb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4580ae16a75bf9725e5b445074f3942e6dccbd95
--- /dev/null
+++ b/graph/incidents_graphml/4/44341bb0-82f8-11ee-9f73-dbbba1248bb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.122
+ 100.64.28.122
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699971330
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 44341bb0-82f8-11ee-9f73-dbbba1248bb5
+
+
+
diff --git a/graph/incidents_graphml/4/44377230-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/44377230-7090-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bb3389206fe130ec77140340d9bafa068c9deb1c
--- /dev/null
+++ b/graph/incidents_graphml/4/44377230-7090-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.254
+ 100.64.7.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697947541
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 44377230-7090-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/4442a4a0-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/4442a4a0-5909-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24563e49c9c549e25a506f43e525f0db346016e7
--- /dev/null
+++ b/graph/incidents_graphml/4/4442a4a0-5909-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.245
+ 100.64.60.245
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360683
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4442a4a0-5909-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/4/444b9670-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/444b9670-7090-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c345082398466b43c930c1af88a8cf78bcfe131
--- /dev/null
+++ b/graph/incidents_graphml/4/444b9670-7090-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.9
+ 100.64.39.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697947541
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 444b9670-7090-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/444c58e0-eb96-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/4/444c58e0-eb96-11ee-8f3a-6b2412cfa52f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af14e28b4ec6609981aaa6c3cf63bd84e80ae08b
--- /dev/null
+++ b/graph/incidents_graphml/4/444c58e0-eb96-11ee-8f3a-6b2412cfa52f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.57
+ 100.64.52.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ INCIDENT_LINK
+ 1711474111
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 444c58e0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474111
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 444c58e0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+
diff --git a/graph/incidents_graphml/4/445affc0-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/445affc0-7090-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5df310bb3d1d2cc7f0295b99212da4a21c623b76
--- /dev/null
+++ b/graph/incidents_graphml/4/445affc0-7090-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.9
+ 100.64.39.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697947542
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 445affc0-7090-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/4461f680-ea53-11ee-a5b0-ebb549372bba.graphml b/graph/incidents_graphml/4/4461f680-ea53-11ee-a5b0-ebb549372bba.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f0a3b06f5a053a6a4e5bc7a3b189b488b874669
--- /dev/null
+++ b/graph/incidents_graphml/4/4461f680-ea53-11ee-a5b0-ebb549372bba.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.131
+ 100.64.42.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.68.227
+ 100.64.68.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.68
+ 100.64.69.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711335384
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4461f680-ea53-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711335384
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4461f680-ea53-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711335384
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4461f680-ea53-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711335384
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4461f680-ea53-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711335384
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4461f680-ea53-11ee-a5b0-ebb549372bba
+
+
+ INCIDENT_LINK
+ 1711335384
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4461f680-ea53-11ee-a5b0-ebb549372bba
+
+
+
diff --git a/graph/incidents_graphml/4/44656440-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/4/44656440-1f34-11ee-bd83-b52c9cbf0232.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a814a372f44b8cb828d9a5f43fe560c20c1777f
--- /dev/null
+++ b/graph/incidents_graphml/4/44656440-1f34-11ee-bd83-b52c9cbf0232.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.40
+ 100.64.77.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.118
+ 100.64.72.118
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.10.116
+ 100.64.10.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689001984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 44656440-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 44656440-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 44656440-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 44656440-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 44656440-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001984
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 44656440-1f34-11ee-bd83-b52c9cbf0232
+
+
+
diff --git a/graph/incidents_graphml/4/446a4200-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/446a4200-7090-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18c86b0dbc7d1d124b7b8cafc9f4b16b4787f279
--- /dev/null
+++ b/graph/incidents_graphml/4/446a4200-7090-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.104
+ 100.64.34.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697947542
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 446a4200-7090-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/446b6710-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/446b6710-d383-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e15c16f21ae876b3da178e99cd3a3f83190365cc
--- /dev/null
+++ b/graph/incidents_graphml/4/446b6710-d383-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.237
+ 100.64.31.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708827123
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 446b6710-d383-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/446e74a0-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/446e74a0-33c8-11ef-bc42-75e180de3d4b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3aafeadbf4d6a36609de62ef192cc13203a3b5f
--- /dev/null
+++ b/graph/incidents_graphml/4/446e74a0-33c8-11ef-bc42-75e180de3d4b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.208
+ 100.64.66.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719412070
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 446e74a0-33c8-11ef-bc42-75e180de3d4b
+
+
+
diff --git a/graph/incidents_graphml/4/4474d140-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/4/4474d140-784f-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9526f581c275dfbd18485a000a99c06300c45df4
--- /dev/null
+++ b/graph/incidents_graphml/4/4474d140-784f-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.207
+ 100.64.67.207
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698799234
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4474d140-784f-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/4/4476ec30-7090-11ee-89bb-13047ce19953.graphml b/graph/incidents_graphml/4/4476ec30-7090-11ee-89bb-13047ce19953.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5f9db17861517985c5f523dd6f151304f12dcce
--- /dev/null
+++ b/graph/incidents_graphml/4/4476ec30-7090-11ee-89bb-13047ce19953.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.104
+ 100.64.34.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697947542
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4476ec30-7090-11ee-89bb-13047ce19953
+
+
+
diff --git a/graph/incidents_graphml/4/447c1850-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/447c1850-5fa5-11ee-8f29-f592a54d646c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e1d7fe5d962a1955ebb1b7547364709344023d1
--- /dev/null
+++ b/graph/incidents_graphml/4/447c1850-5fa5-11ee-8f29-f592a54d646c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.49
+ 100.64.22.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696087391
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 447c1850-5fa5-11ee-8f29-f592a54d646c
+
+
+
diff --git a/graph/incidents_graphml/4/447c5750-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/447c5750-33c8-11ef-bc42-75e180de3d4b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81c2b981746abf9da0191be9e3205bc3fa52c8c9
--- /dev/null
+++ b/graph/incidents_graphml/4/447c5750-33c8-11ef-bc42-75e180de3d4b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.208
+ 100.64.66.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719412070
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 447c5750-33c8-11ef-bc42-75e180de3d4b
+
+
+
diff --git a/graph/incidents_graphml/4/448334d0-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/448334d0-d383-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..210e7ab9ce5aeac090be12bbb8e91bc81ee1270e
--- /dev/null
+++ b/graph/incidents_graphml/4/448334d0-d383-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.237
+ 100.64.31.237
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708827123
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 448334d0-d383-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/448ce9e0-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/4/448ce9e0-769e-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..393f2ac72496f877aec9cc0d7c3134cb1b5fa280
--- /dev/null
+++ b/graph/incidents_graphml/4/448ce9e0-769e-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.32
+ 100.64.55.32
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698613262
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 448ce9e0-769e-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/4/448dcc00-4e14-11ee-a329-837d93fb4fa8.graphml b/graph/incidents_graphml/4/448dcc00-4e14-11ee-a329-837d93fb4fa8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a078e92d140f91e30a23eb25b4d0b81806f34d3
--- /dev/null
+++ b/graph/incidents_graphml/4/448dcc00-4e14-11ee-a329-837d93fb4fa8.graphml
@@ -0,0 +1,705 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.127
+ 100.64.35.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.88
+ 100.64.37.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.31
+ 100.64.4.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.89
+ 100.64.37.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.90
+ 100.64.37.90
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.91
+ 100.64.37.91
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.92
+ 100.64.37.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.93
+ 100.64.37.93
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.94
+ 100.64.37.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.95
+ 100.64.37.95
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.50
+ 100.64.9.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.96
+ 100.64.37.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.194
+ 100.64.29.194
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.97
+ 100.64.37.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.68
+ 100.64.30.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.98
+ 100.64.37.98
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.53
+ 100.64.37.53
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+ INCIDENT_LINK
+ 1694155945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 448dcc00-4e14-11ee-a329-837d93fb4fa8
+
+
+
diff --git a/graph/incidents_graphml/4/44921150-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/44921150-5fa5-11ee-8f29-f592a54d646c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..861b27103026b21e875a6f49af721e415d6ca778
--- /dev/null
+++ b/graph/incidents_graphml/4/44921150-5fa5-11ee-8f29-f592a54d646c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.49
+ 100.64.22.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696087392
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 44921150-5fa5-11ee-8f29-f592a54d646c
+
+
+
diff --git a/graph/incidents_graphml/4/449d4bb0-488a-11ee-bc66-374cad92392b.graphml b/graph/incidents_graphml/4/449d4bb0-488a-11ee-bc66-374cad92392b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fb5db7f928bf95bec8c3a0d3074cdc88e66d4f1
--- /dev/null
+++ b/graph/incidents_graphml/4/449d4bb0-488a-11ee-bc66-374cad92392b.graphml
@@ -0,0 +1,799 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.196
+ 100.64.5.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.183
+ 100.64.30.183
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.174
+ 100.64.11.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.182
+ 100.64.55.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.225
+ 100.64.29.225
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.183
+ 100.64.55.183
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.184
+ 100.64.55.184
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.185
+ 100.64.55.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.31
+ 100.64.25.31
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.77
+ 100.64.27.77
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.186
+ 100.64.55.186
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.187
+ 100.64.55.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.188
+ 100.64.55.188
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.189
+ 100.64.55.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.194
+ 100.64.26.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.190
+ 100.64.55.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.191
+ 100.64.55.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.153
+ 100.64.9.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.192
+ 100.64.55.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546918
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 449d4bb0-488a-11ee-bc66-374cad92392b
+
+
+
diff --git a/graph/incidents_graphml/4/44a26660-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/44a26660-ab93-11ee-be9c-dfff52fc589e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..709581a2096a4b186960f8597c6823aafdf4b080
--- /dev/null
+++ b/graph/incidents_graphml/4/44a26660-ab93-11ee-be9c-dfff52fc589e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.139
+ 100.64.52.139
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704435949
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 44a26660-ab93-11ee-be9c-dfff52fc589e
+
+
+
diff --git a/graph/incidents_graphml/4/44a4c820-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/44a4c820-994f-11ee-8477-4312413938e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9283055eacc82638daa37f43c6024e491dd34c24
--- /dev/null
+++ b/graph/incidents_graphml/4/44a4c820-994f-11ee-8477-4312413938e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.218
+ 100.64.52.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702427622
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 44a4c820-994f-11ee-8477-4312413938e1
+
+
+
diff --git a/graph/incidents_graphml/4/44a76e10-5fa5-11ee-8f29-f592a54d646c.graphml b/graph/incidents_graphml/4/44a76e10-5fa5-11ee-8f29-f592a54d646c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f5e56e085f27c5cf4ff784fa0651187117b2305
--- /dev/null
+++ b/graph/incidents_graphml/4/44a76e10-5fa5-11ee-8f29-f592a54d646c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.249
+ USER-0015-1295.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696087392
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 44a76e10-5fa5-11ee-8f29-f592a54d646c
+
+
+
diff --git a/graph/incidents_graphml/4/44b137f0-3552-11ef-bea6-a94fc9e3b8ec.graphml b/graph/incidents_graphml/4/44b137f0-3552-11ef-bea6-a94fc9e3b8ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1f887b84fd586e17384acfcb163273ff0dc816a
--- /dev/null
+++ b/graph/incidents_graphml/4/44b137f0-3552-11ef-bea6-a94fc9e3b8ec.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.17.160.55
+ USER-0015-1988.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.77
+ 100.64.87.77
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719581292
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 44b137f0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+ INCIDENT_LINK
+ 1719581292
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 44b137f0-3552-11ef-bea6-a94fc9e3b8ec
+
+
+
diff --git a/graph/incidents_graphml/4/44b99c00-fa17-11ed-a491-43a9a8789c21.graphml b/graph/incidents_graphml/4/44b99c00-fa17-11ed-a491-43a9a8789c21.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ba103672cd749aa44631e425bad052fb470807c
--- /dev/null
+++ b/graph/incidents_graphml/4/44b99c00-fa17-11ed-a491-43a9a8789c21.graphml
@@ -0,0 +1,895 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.98
+ 100.64.14.98
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.99
+ 100.64.14.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.100
+ 100.64.14.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.101
+ 100.64.14.101
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.102
+ 100.64.14.102
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.103
+ 100.64.14.103
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.104
+ 100.64.14.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.30
+ 100.64.8.30
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.105
+ 100.64.14.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.8.153
+ 100.64.8.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.106
+ 100.64.14.106
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.107
+ 100.64.14.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.108
+ 100.64.14.108
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.109
+ 100.64.14.109
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+ INCIDENT_LINK
+ 1684921336
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44b99c00-fa17-11ed-a491-43a9a8789c21
+
+
+
diff --git a/graph/incidents_graphml/4/44bb6ca0-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/44bb6ca0-ab93-11ee-be9c-dfff52fc589e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ead8ec2dadd615c8871ea23edd545abe9f72c0a
--- /dev/null
+++ b/graph/incidents_graphml/4/44bb6ca0-ab93-11ee-be9c-dfff52fc589e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.141
+ 100.64.52.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704435949
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 44bb6ca0-ab93-11ee-be9c-dfff52fc589e
+
+
+
diff --git a/graph/incidents_graphml/4/44cc32c0-2957-11ed-833a-955cfd42297d.graphml b/graph/incidents_graphml/4/44cc32c0-2957-11ed-833a-955cfd42297d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0d8d8fda5c423cbde7fa230c7ee6987645fd39e
--- /dev/null
+++ b/graph/incidents_graphml/4/44cc32c0-2957-11ed-833a-955cfd42297d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.226.235
+ 172.31.226.235
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.240
+ 100.64.87.240
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661969031
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44cc32c0-2957-11ed-833a-955cfd42297d
+
+
+ INCIDENT_LINK
+ 1661969031
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44cc32c0-2957-11ed-833a-955cfd42297d
+
+
+
diff --git a/graph/incidents_graphml/4/44d0a250-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/44d0a250-ab93-11ee-be9c-dfff52fc589e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6aea3ced72a3add515c3ff251d941cb42ea4699
--- /dev/null
+++ b/graph/incidents_graphml/4/44d0a250-ab93-11ee-be9c-dfff52fc589e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.143
+ 100.64.52.143
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704435949
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 44d0a250-ab93-11ee-be9c-dfff52fc589e
+
+
+
diff --git a/graph/incidents_graphml/4/44da2cb0-9fb5-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/44da2cb0-9fb5-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a5d9cc59c87fcb34a6b6109404eed1e1c4736c0
--- /dev/null
+++ b/graph/incidents_graphml/4/44da2cb0-9fb5-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.122
+ 100.64.24.122
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703131138
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 44da2cb0-9fb5-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/44e56e80-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/44e56e80-7e0f-11ee-8917-8796f098c594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4535b2076b22cdb6f935028ea307a878fe10250
--- /dev/null
+++ b/graph/incidents_graphml/4/44e56e80-7e0f-11ee-8917-8796f098c594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.131
+ 100.64.58.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699431454
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 44e56e80-7e0f-11ee-8917-8796f098c594
+
+
+
diff --git a/graph/incidents_graphml/4/44ef4de0-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/44ef4de0-ab93-11ee-be9c-dfff52fc589e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2751da4f77a9806fdb45ed2c51a6d0ab1e3c6ae6
--- /dev/null
+++ b/graph/incidents_graphml/4/44ef4de0-ab93-11ee-be9c-dfff52fc589e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.166
+ 100.64.40.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704435950
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 44ef4de0-ab93-11ee-be9c-dfff52fc589e
+
+
+
diff --git a/graph/incidents_graphml/4/44fea1b0-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/44fea1b0-41f3-11ed-a891-2d9e83e3a063.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b3ff7c91c4150982718703b74327abb9fe13fba
--- /dev/null
+++ b/graph/incidents_graphml/4/44fea1b0-41f3-11ed-a891-2d9e83e3a063.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.58
+ 100.64.94.58
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1664674860
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 44fea1b0-41f3-11ed-a891-2d9e83e3a063
+
+
+
diff --git a/graph/incidents_graphml/4/4507f080-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/4507f080-41f3-11ed-a891-2d9e83e3a063.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea3c9b537bbf9c9f8667643ba56ca8804a12f0d7
--- /dev/null
+++ b/graph/incidents_graphml/4/4507f080-41f3-11ed-a891-2d9e83e3a063.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.58
+ 100.64.94.58
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664674860
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4507f080-41f3-11ed-a891-2d9e83e3a063
+
+
+
diff --git a/graph/incidents_graphml/4/4509dac0-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/4509dac0-ab93-11ee-be9c-dfff52fc589e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4734b1eea966c95bda013be97509b338b683f96a
--- /dev/null
+++ b/graph/incidents_graphml/4/4509dac0-ab93-11ee-be9c-dfff52fc589e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.1
+ 100.64.15.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704435950
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4509dac0-ab93-11ee-be9c-dfff52fc589e
+
+
+
diff --git a/graph/incidents_graphml/4/450ad6b0-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/4/450ad6b0-41f3-11ed-a891-2d9e83e3a063.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21b20a22f8a33b002108bcac6c2e405edecd955d
--- /dev/null
+++ b/graph/incidents_graphml/4/450ad6b0-41f3-11ed-a891-2d9e83e3a063.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.60
+ 100.64.94.60
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1664674860
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 450ad6b0-41f3-11ed-a891-2d9e83e3a063
+
+
+
diff --git a/graph/incidents_graphml/4/4519b940-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/4519b940-ab93-11ee-be9c-dfff52fc589e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b8170791dd6277d242eaa48b09ef0662041afa9
--- /dev/null
+++ b/graph/incidents_graphml/4/4519b940-ab93-11ee-be9c-dfff52fc589e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.1
+ 100.64.15.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704435950
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4519b940-ab93-11ee-be9c-dfff52fc589e
+
+
+
diff --git a/graph/incidents_graphml/4/451e00e0-503f-11ee-b697-c3310c70b120.graphml b/graph/incidents_graphml/4/451e00e0-503f-11ee-b697-c3310c70b120.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9901e63db257be53d48b3144b28b32e509cb4e02
--- /dev/null
+++ b/graph/incidents_graphml/4/451e00e0-503f-11ee-b697-c3310c70b120.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.132
+ 100.64.68.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.114
+ 100.64.11.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1694394316
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 451e00e0-503f-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394316
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 451e00e0-503f-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394316
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 451e00e0-503f-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394316
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 451e00e0-503f-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394316
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 451e00e0-503f-11ee-b697-c3310c70b120
+
+
+ INCIDENT_LINK
+ 1694394316
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 451e00e0-503f-11ee-b697-c3310c70b120
+
+
+
diff --git a/graph/incidents_graphml/4/451ee460-676e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/4/451ee460-676e-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d8b734837a44674f7af95f80eb30080fadcaa09
--- /dev/null
+++ b/graph/incidents_graphml/4/451ee460-676e-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,817 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.101
+ 100.64.34.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.124
+ 100.64.12.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.102
+ 100.64.34.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.195
+ 100.64.19.195
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.103
+ 100.64.34.103
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.104
+ 100.64.34.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.105
+ 100.64.34.105
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.106
+ 100.64.34.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.107
+ USER-0015-1301.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.108
+ 100.64.34.108
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.109
+ 100.64.34.109
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.110
+ 100.64.34.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.111
+ 100.64.34.111
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.112
+ 100.64.34.112
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.113
+ 100.64.34.113
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.21
+ 100.64.15.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943379
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 451ee460-676e-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/4/45286f20-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/45286f20-40ff-11ee-b8c2-77c1ecbb2825.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53a16d3aac0e86324725e99a84521c4e293443d8
--- /dev/null
+++ b/graph/incidents_graphml/4/45286f20-40ff-11ee-b8c2-77c1ecbb2825.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.70.207
+ 100.64.70.207
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692717561
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 45286f20-40ff-11ee-b8c2-77c1ecbb2825
+
+
+
diff --git a/graph/incidents_graphml/4/452a8e70-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/452a8e70-850d-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1c5088bf3f2a793aa6483f87c4c49ee3ba6ed89
--- /dev/null
+++ b/graph/incidents_graphml/4/452a8e70-850d-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.42
+ 100.64.9.42
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700200253
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 452a8e70-850d-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/4/4538efd0-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/4/4538efd0-2435-11ee-bc29-cfb067a56058.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ad4e9d2eb055647952c0855214147be856e3b49
--- /dev/null
+++ b/graph/incidents_graphml/4/4538efd0-2435-11ee-bc29-cfb067a56058.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.70
+ 100.64.33.70
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.12.47
+ 100.64.12.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.30.91
+ 100.64.30.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1689552170
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4538efd0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552170
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4538efd0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552170
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4538efd0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552170
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4538efd0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552170
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4538efd0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552170
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4538efd0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552170
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4538efd0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552170
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4538efd0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552170
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4538efd0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552170
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4538efd0-2435-11ee-bc29-cfb067a56058
+
+
+
diff --git a/graph/incidents_graphml/4/45445800-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/45445800-850d-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9aa1d42864a69d0aa88373a4718fdb9ac1fa6c73
--- /dev/null
+++ b/graph/incidents_graphml/4/45445800-850d-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.46
+ 100.64.9.46
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700200253
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45445800-850d-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/4/456268f0-5b2c-11ee-a5b1-e563b721d2c6.graphml b/graph/incidents_graphml/4/456268f0-5b2c-11ee-a5b1-e563b721d2c6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..31e74727951fa3650d18850d6d2f770e862454b1
--- /dev/null
+++ b/graph/incidents_graphml/4/456268f0-5b2c-11ee-a5b1-e563b721d2c6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1695595619
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 456268f0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+ INCIDENT_LINK
+ 1695595619
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 456268f0-5b2c-11ee-a5b1-e563b721d2c6
+
+
+
diff --git a/graph/incidents_graphml/4/4565c4d0-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4565c4d0-6fe7-11ee-bec7-efacac475e54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad970fb33fb696f9ea25cd8f72ee1745175d23a2
--- /dev/null
+++ b/graph/incidents_graphml/4/4565c4d0-6fe7-11ee-bec7-efacac475e54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.25
+ 100.64.63.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697874958
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4565c4d0-6fe7-11ee-bec7-efacac475e54
+
+
+
diff --git a/graph/incidents_graphml/4/45670060-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/45670060-5909-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..366e77989530e554e1487126ed115da26149b508
--- /dev/null
+++ b/graph/incidents_graphml/4/45670060-5909-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,723 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.247
+ 100.64.60.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.130
+ 100.64.9.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.106
+ 100.64.34.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.31
+ 100.64.28.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.248
+ 100.64.60.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.190
+ 100.64.20.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.156
+ 100.64.48.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.249
+ 100.64.60.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.250
+ 100.64.60.250
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.251
+ 100.64.60.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.252
+ 100.64.60.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.253
+ 100.64.60.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.1
+ 100.64.42.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.254
+ 100.64.60.254
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.255
+ 100.64.60.255
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.61.1
+ 100.64.61.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45670060-5909-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/4/456883d0-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/456883d0-62c9-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e959175bd5dd106c7f5d4a0ebb24ec762f66692c
--- /dev/null
+++ b/graph/incidents_graphml/4/456883d0-62c9-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.163
+ 100.64.57.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696432708
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 456883d0-62c9-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/4/4573f5a0-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/4573f5a0-6fe7-11ee-bec7-efacac475e54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f24c7c25641a504012c6ac5a8fc8646e3b737c83
--- /dev/null
+++ b/graph/incidents_graphml/4/4573f5a0-6fe7-11ee-bec7-efacac475e54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.25
+ 100.64.63.25
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697874958
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4573f5a0-6fe7-11ee-bec7-efacac475e54
+
+
+
diff --git a/graph/incidents_graphml/4/4577ed20-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/4577ed20-62c9-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8642be6bfced5d9d17bd819fe82ecf61efb048f9
--- /dev/null
+++ b/graph/incidents_graphml/4/4577ed20-62c9-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.163
+ 100.64.57.163
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696432708
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4577ed20-62c9-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/4/45813c10-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/45813c10-6fe7-11ee-bec7-efacac475e54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3a957cd6cbdb2fb06c037d66c29dba31829fdbf
--- /dev/null
+++ b/graph/incidents_graphml/4/45813c10-6fe7-11ee-bec7-efacac475e54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.154
+ 100.64.11.154
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697874958
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45813c10-6fe7-11ee-bec7-efacac475e54
+
+
+
diff --git a/graph/incidents_graphml/4/45813f20-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/45813f20-5909-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8305e115aee5bfd598c22b7552fc4b1c2221f37
--- /dev/null
+++ b/graph/incidents_graphml/4/45813f20-5909-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.247
+ 100.64.60.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 45813f20-5909-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/4/4583db20-488a-11ee-bc66-374cad92392b.graphml b/graph/incidents_graphml/4/4583db20-488a-11ee-bc66-374cad92392b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2aae69112323e063fa499d49cc57f6d603da236
--- /dev/null
+++ b/graph/incidents_graphml/4/4583db20-488a-11ee-bc66-374cad92392b.graphml
@@ -0,0 +1,777 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.204
+ 100.64.55.204
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.205
+ 100.64.55.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.114
+ 100.64.37.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.206
+ 100.64.55.206
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.1
+ 100.64.42.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.207
+ 100.64.55.207
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.208
+ 100.64.55.208
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.192
+ 100.64.21.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.194
+ 100.64.26.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.224
+ 100.64.27.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.209
+ 100.64.55.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.40
+ 100.64.39.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.191
+ 100.64.55.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.93
+ 100.64.33.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.52
+ 100.64.51.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.210
+ 100.64.55.210
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.211
+ 100.64.55.211
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.212
+ 100.64.55.212
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.213
+ 100.64.55.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+ INCIDENT_LINK
+ 1693546920
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4583db20-488a-11ee-bc66-374cad92392b
+
+
+
diff --git a/graph/incidents_graphml/4/458b0360-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/4/458b0360-140e-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2099bbf37d4cb2b487f1f8431422a8f94dcd9bd8
--- /dev/null
+++ b/graph/incidents_graphml/4/458b0360-140e-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.67
+ 100.64.33.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.15
+ 100.64.74.15
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.226
+ 100.64.82.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687776202
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 458b0360-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776202
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 458b0360-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776202
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 458b0360-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776202
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 458b0360-140e-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/4/458ea990-6fe7-11ee-bec7-efacac475e54.graphml b/graph/incidents_graphml/4/458ea990-6fe7-11ee-bec7-efacac475e54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91f0498715f417283620e6f7f6e00c9190737d77
--- /dev/null
+++ b/graph/incidents_graphml/4/458ea990-6fe7-11ee-bec7-efacac475e54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.154
+ 100.64.11.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697874959
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 458ea990-6fe7-11ee-bec7-efacac475e54
+
+
+
diff --git a/graph/incidents_graphml/4/45b77780-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/4/45b77780-589f-11ee-a130-b3fc4de2b604.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aba1a3bed93e12f6fb16b40bea28b8f69a73fa9b
--- /dev/null
+++ b/graph/incidents_graphml/4/45b77780-589f-11ee-a130-b3fc4de2b604.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.132
+ 100.64.91.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695315158
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 45b77780-589f-11ee-a130-b3fc4de2b604
+
+
+
diff --git a/graph/incidents_graphml/4/45be47d0-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/45be47d0-13f8-11ef-b4e0-63669a8fd788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b6551ba0e78f09cb69049e62c3c4aaaa2efd3d2
--- /dev/null
+++ b/graph/incidents_graphml/4/45be47d0-13f8-11ef-b4e0-63669a8fd788.graphml
@@ -0,0 +1,287 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.73
+ 100.64.26.73
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.155
+ 100.64.31.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.156
+ 100.64.31.156
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.157
+ 100.64.31.157
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.120
+ 100.64.25.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.60
+ 100.64.13.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.158
+ 100.64.31.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45be47d0-13f8-11ef-b4e0-63669a8fd788
+
+
+
diff --git a/graph/incidents_graphml/4/45c07d90-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/45c07d90-2cc0-11ee-9ea2-17c9a8b72baa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2f3d428e3a73c934cb99be973363ce156147f02
--- /dev/null
+++ b/graph/incidents_graphml/4/45c07d90-2cc0-11ee-9ea2-17c9a8b72baa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.204
+ USER-0015-1338.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690491481
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45c07d90-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+
diff --git a/graph/incidents_graphml/4/45c55210-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/45c55210-4e4a-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..195a87a2716f11cf5825030fb170d2c965101f73
--- /dev/null
+++ b/graph/incidents_graphml/4/45c55210-4e4a-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.161
+ 100.64.14.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694179140
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45c55210-4e4a-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/4/45c8fac0-81bf-11ee-967b-47c68907a0bd.graphml b/graph/incidents_graphml/4/45c8fac0-81bf-11ee-967b-47c68907a0bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d951ab6c2ae2ab346183f244a76134d7ec19865e
--- /dev/null
+++ b/graph/incidents_graphml/4/45c8fac0-81bf-11ee-967b-47c68907a0bd.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.158
+ 100.64.68.158
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.20
+ 100.64.68.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.51.48
+ 100.64.51.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1699836900
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45c8fac0-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699836900
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45c8fac0-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699836900
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45c8fac0-81bf-11ee-967b-47c68907a0bd
+
+
+ INCIDENT_LINK
+ 1699836900
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45c8fac0-81bf-11ee-967b-47c68907a0bd
+
+
+
diff --git a/graph/incidents_graphml/4/45d52780-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/45d52780-391f-11ed-b85e-918b65550ba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cd30329b8a7348541ff79c78b699b49449a970f
--- /dev/null
+++ b/graph/incidents_graphml/4/45d52780-391f-11ed-b85e-918b65550ba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.110
+ 100.64.2.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.17
+ 100.64.77.17
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663704199
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45d52780-391f-11ed-b85e-918b65550ba2
+
+
+
diff --git a/graph/incidents_graphml/4/45d6b730-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/45d6b730-33c8-11ef-bc42-75e180de3d4b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7bc7b01d1377c8f79bc8ae57a8beda5ca22db4e9
--- /dev/null
+++ b/graph/incidents_graphml/4/45d6b730-33c8-11ef-bc42-75e180de3d4b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.210
+ 100.64.66.210
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719412073
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45d6b730-33c8-11ef-bc42-75e180de3d4b
+
+
+
diff --git a/graph/incidents_graphml/4/45d760f0-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/45d760f0-2cc0-11ee-9ea2-17c9a8b72baa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5579030d1573c0e2bd6f48a1e3a7bad3f5b69681
--- /dev/null
+++ b/graph/incidents_graphml/4/45d760f0-2cc0-11ee-9ea2-17c9a8b72baa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.204
+ USER-0015-1338.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690491481
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 45d760f0-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+
diff --git a/graph/incidents_graphml/4/45d7a190-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/45d7a190-4e4a-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3096142d372852f5b3bb4b214c1d2ca9692e919e
--- /dev/null
+++ b/graph/incidents_graphml/4/45d7a190-4e4a-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.161
+ 100.64.14.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694179140
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 45d7a190-4e4a-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/4/45d8a460-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/45d8a460-62c1-11ee-b24d-ffed8a6ae3b7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..408bdd5f0b8dc5336558926444b4bd8da80e23e2
--- /dev/null
+++ b/graph/incidents_graphml/4/45d8a460-62c1-11ee-b24d-ffed8a6ae3b7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.244
+ 100.64.3.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696429273
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45d8a460-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+
diff --git a/graph/incidents_graphml/4/45d8f230-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/45d8f230-f5ee-11ec-ae2b-8fa08eaee108.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51cf1e8f9101ff55072c74656babdc861c28316e
--- /dev/null
+++ b/graph/incidents_graphml/4/45d8f230-f5ee-11ec-ae2b-8fa08eaee108.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.34
+ 100.64.82.34
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.32
+ USER-0015-1913.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.35
+ 100.64.82.35
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.36
+ 100.64.82.36
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.37
+ 100.64.82.37
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.38
+ 100.64.82.38
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.39
+ 100.64.82.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.40
+ 100.64.82.40
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.41
+ 100.64.82.41
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8f230-f5ee-11ec-ae2b-8fa08eaee108
+
+
+
diff --git a/graph/incidents_graphml/4/45d8fbc0-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/45d8fbc0-13f8-11ef-b4e0-63669a8fd788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7bc9ebaf66105b40c7d8f03b38b4997f60649bbb
--- /dev/null
+++ b/graph/incidents_graphml/4/45d8fbc0-13f8-11ef-b4e0-63669a8fd788.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.163
+ 100.64.31.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45d8fbc0-13f8-11ef-b4e0-63669a8fd788
+
+
+
diff --git a/graph/incidents_graphml/4/45e69050-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/45e69050-13f8-11ef-b4e0-63669a8fd788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..22007f6919b32dda9a86d9f7490db0b447d601dd
--- /dev/null
+++ b/graph/incidents_graphml/4/45e69050-13f8-11ef-b4e0-63669a8fd788.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.163
+ 100.64.31.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715914251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 45e69050-13f8-11ef-b4e0-63669a8fd788
+
+
+
diff --git a/graph/incidents_graphml/4/45e8a9f0-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/45e8a9f0-62c1-11ee-b24d-ffed8a6ae3b7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1634b5b053463f413f33cf4c479ef2feaa453e23
--- /dev/null
+++ b/graph/incidents_graphml/4/45e8a9f0-62c1-11ee-b24d-ffed8a6ae3b7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.244
+ 100.64.3.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696429273
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 45e8a9f0-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+
diff --git a/graph/incidents_graphml/4/45eca7f0-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/45eca7f0-62c9-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2024555089ba8e07b8c8f9af5bf7c028b04f57c6
--- /dev/null
+++ b/graph/incidents_graphml/4/45eca7f0-62c9-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.165
+ 100.64.57.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696432709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45eca7f0-62c9-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/4/45f16100-5793-11ee-97ff-3b19ab007f30.graphml b/graph/incidents_graphml/4/45f16100-5793-11ee-97ff-3b19ab007f30.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86feb4d88da0fceffa71f3e09deeca2489131933
--- /dev/null
+++ b/graph/incidents_graphml/4/45f16100-5793-11ee-97ff-3b19ab007f30.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.95
+ 100.64.69.95
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1695200054
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45f16100-5793-11ee-97ff-3b19ab007f30
+
+
+ INCIDENT_LINK
+ 1695200054
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45f16100-5793-11ee-97ff-3b19ab007f30
+
+
+
diff --git a/graph/incidents_graphml/4/45fb26e0-62c9-11ee-a98e-093b6593236c.graphml b/graph/incidents_graphml/4/45fb26e0-62c9-11ee-a98e-093b6593236c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17fabeb3c03485dc62465d4879813cd7121c4bd4
--- /dev/null
+++ b/graph/incidents_graphml/4/45fb26e0-62c9-11ee-a98e-093b6593236c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.165
+ 100.64.57.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696432709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 45fb26e0-62c9-11ee-a98e-093b6593236c
+
+
+
diff --git a/graph/incidents_graphml/4/45fb4040-0c8d-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/4/45fb4040-0c8d-11ee-af4a-2171e1d29da4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6925314061e96f069402aa60c6ed513545de0c8
--- /dev/null
+++ b/graph/incidents_graphml/4/45fb4040-0c8d-11ee-af4a-2171e1d29da4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.49
+ 100.64.23.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686951139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45fb4040-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 45fb4040-0c8d-11ee-af4a-2171e1d29da4
+
+
+
diff --git a/graph/incidents_graphml/4/45fc79e0-eb96-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/4/45fc79e0-eb96-11ee-8f3a-6b2412cfa52f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd0b0a866be221ffbd2c2df1c8f5d29beb278799
--- /dev/null
+++ b/graph/incidents_graphml/4/45fc79e0-eb96-11ee-8f3a-6b2412cfa52f.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.144.11.175
+ 10.144.11.175
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","PAN NGFW","Windows Active Directory"]
+
+
+ HOST
+ 100.64.70.17
+ USER-0015-1541.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.18
+ 100.64.70.18
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.19
+ 100.64.70.19
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.20
+ 100.64.70.20
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.21
+ 100.64.70.21
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711474114
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474114
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474114
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474114
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474114
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474114
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474114
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474114
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474114
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711474114
+ malicious
+ 0.7
+ 0.68359375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 45fc79e0-eb96-11ee-8f3a-6b2412cfa52f
+
+
+
diff --git a/graph/incidents_graphml/4/460b2da0-93b7-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/4/460b2da0-93b7-11ee-ad07-e3190f846a2a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ee26be89f0bc742ff429256ee2f766c4204f15f
--- /dev/null
+++ b/graph/incidents_graphml/4/460b2da0-93b7-11ee-ad07-e3190f846a2a.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.123
+ 100.64.11.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1701812585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 460b2da0-93b7-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 460b2da0-93b7-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 460b2da0-93b7-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 460b2da0-93b7-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 460b2da0-93b7-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812585
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 460b2da0-93b7-11ee-ad07-e3190f846a2a
+
+
+
diff --git a/graph/incidents_graphml/4/460cb240-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/460cb240-391f-11ed-b85e-918b65550ba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c4f309f5b3bbb5aae399cecd82815e344c2309c
--- /dev/null
+++ b/graph/incidents_graphml/4/460cb240-391f-11ed-b85e-918b65550ba2.graphml
@@ -0,0 +1,811 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.220
+ 100.64.79.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.114
+ 100.64.71.114
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.72
+ 100.64.73.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.221
+ 100.64.79.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.232
+ 100.64.71.232
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.54.169
+ 100.64.54.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.222
+ 100.64.79.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.223
+ 100.64.79.223
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.129
+ 100.64.71.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.173
+ 100.64.72.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.95
+ 100.64.74.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.224
+ 100.64.79.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.225
+ 100.64.79.225
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.53
+ 100.64.73.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.226
+ 100.64.79.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.25
+ 100.64.77.25
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.178
+ 100.64.72.178
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.40
+ 100.64.1.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.227
+ 100.64.79.227
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.38.73
+ 100.64.38.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.228
+ 100.64.79.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 460cb240-391f-11ed-b85e-918b65550ba2
+
+
+
diff --git a/graph/incidents_graphml/4/4610b2f0-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/4610b2f0-33c8-11ef-bc42-75e180de3d4b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b7c4652efcd6d809f8041fecf04c65a21464539
--- /dev/null
+++ b/graph/incidents_graphml/4/4610b2f0-33c8-11ef-bc42-75e180de3d4b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.133
+ 100.64.46.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719412073
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4610b2f0-33c8-11ef-bc42-75e180de3d4b
+
+
+
diff --git a/graph/incidents_graphml/4/4611c410-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/4611c410-d383-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5df47f2210a5cc203c82782931374c7a1e9ce0bb
--- /dev/null
+++ b/graph/incidents_graphml/4/4611c410-d383-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.239
+ 100.64.31.239
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708827126
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4611c410-d383-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/46129fd0-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/46129fd0-f5ee-11ec-ae2b-8fa08eaee108.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26eed206701f4d215e5830f15fc8d2ae823087ad
--- /dev/null
+++ b/graph/incidents_graphml/4/46129fd0-f5ee-11ec-ae2b-8fa08eaee108.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.201
+ 100.64.12.201
+ ["Exploiting Host"]
+ 0.83125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.30
+ 100.64.74.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.29
+ 100.64.74.29
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.83125
+ 0.83125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46129fd0-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.83125
+ 0.83125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46129fd0-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.83125
+ 0.83125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46129fd0-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316426
+ malicious
+ 0.83125
+ 0.83125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46129fd0-f5ee-11ec-ae2b-8fa08eaee108
+
+
+
diff --git a/graph/incidents_graphml/4/461ebe50-1aa5-11ee-ae54-3b636b49055b.graphml b/graph/incidents_graphml/4/461ebe50-1aa5-11ee-ae54-3b636b49055b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d24dae740b9ebf175c1f7d4ba8be4499d59ca9d0
--- /dev/null
+++ b/graph/incidents_graphml/4/461ebe50-1aa5-11ee-ae54-3b636b49055b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.89.174
+ 100.64.89.174
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.178.215.78
+ 10.178.215.78
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688500764
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 461ebe50-1aa5-11ee-ae54-3b636b49055b
+
+
+ INCIDENT_LINK
+ 1688500764
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 461ebe50-1aa5-11ee-ae54-3b636b49055b
+
+
+
diff --git a/graph/incidents_graphml/4/461f8000-33c8-11ef-bc42-75e180de3d4b.graphml b/graph/incidents_graphml/4/461f8000-33c8-11ef-bc42-75e180de3d4b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdf66e4e10cf3a01bdf9f8ec9444da69aa1f7dca
--- /dev/null
+++ b/graph/incidents_graphml/4/461f8000-33c8-11ef-bc42-75e180de3d4b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.133
+ 100.64.46.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719412073
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 461f8000-33c8-11ef-bc42-75e180de3d4b
+
+
+
diff --git a/graph/incidents_graphml/4/462ed2c0-ab93-11ee-be9c-dfff52fc589e.graphml b/graph/incidents_graphml/4/462ed2c0-ab93-11ee-be9c-dfff52fc589e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc1f8358fdb7826e7645e7643c3e69b6b8ba8986
--- /dev/null
+++ b/graph/incidents_graphml/4/462ed2c0-ab93-11ee-be9c-dfff52fc589e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.145
+ 100.64.52.145
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704435952
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 462ed2c0-ab93-11ee-be9c-dfff52fc589e
+
+
+
diff --git a/graph/incidents_graphml/4/46344740-6e59-11ee-bd33-e97c9a557859.graphml b/graph/incidents_graphml/4/46344740-6e59-11ee-bd33-e97c9a557859.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a348948e86c32e24ee76ce3737eb05f20b5dcdbe
--- /dev/null
+++ b/graph/incidents_graphml/4/46344740-6e59-11ee-bd33-e97c9a557859.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.50
+ 100.64.24.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.62
+ 100.64.40.62
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.63
+ 100.64.40.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.220
+ 100.64.31.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.28
+ 100.64.2.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.187
+ 100.64.7.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.109
+ 100.64.34.109
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.255
+ 100.64.23.255
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.242
+ 100.64.8.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.64
+ 100.64.40.64
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.65
+ 100.64.40.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.66
+ 100.64.40.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.5
+ 100.64.34.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.67
+ 100.64.40.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.68
+ 100.64.40.68
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.30
+ 100.64.6.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.69
+ 100.64.40.69
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.93
+ 100.64.35.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.70
+ 100.64.40.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+ INCIDENT_LINK
+ 1697704020
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46344740-6e59-11ee-bd33-e97c9a557859
+
+
+
diff --git a/graph/incidents_graphml/4/463dfa40-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/463dfa40-850d-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f12483d434bccb2ffd59e2f7fa3677cfbd6742d
--- /dev/null
+++ b/graph/incidents_graphml/4/463dfa40-850d-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.48
+ 100.64.9.48
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700200255
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 463dfa40-850d-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/4/46428970-f5ee-11ec-ae2b-8fa08eaee108.graphml b/graph/incidents_graphml/4/46428970-f5ee-11ec-ae2b-8fa08eaee108.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..136ceffcdb71832b60991f5daccfd706e099862d
--- /dev/null
+++ b/graph/incidents_graphml/4/46428970-f5ee-11ec-ae2b-8fa08eaee108.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.42
+ 100.64.82.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.82
+ 100.64.71.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.218
+ 100.64.71.218
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656316427
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46428970-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316427
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46428970-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316427
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46428970-f5ee-11ec-ae2b-8fa08eaee108
+
+
+ INCIDENT_LINK
+ 1656316427
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46428970-f5ee-11ec-ae2b-8fa08eaee108
+
+
+
diff --git a/graph/incidents_graphml/4/464d5e90-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/4/464d5e90-769e-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63fcc707dc500e608492b71269df3a7fe210255a
--- /dev/null
+++ b/graph/incidents_graphml/4/464d5e90-769e-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.34
+ 100.64.55.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698613265
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 464d5e90-769e-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/4/465bbea0-93b7-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/4/465bbea0-93b7-11ee-ad07-e3190f846a2a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5c378921e35b9b78b599457e5c02234472a38b7
--- /dev/null
+++ b/graph/incidents_graphml/4/465bbea0-93b7-11ee-ad07-e3190f846a2a.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.139
+ 100.64.36.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.36.99
+ 100.64.36.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.80
+ 100.64.69.80
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.81
+ 100.64.69.81
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1701812586
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 465bbea0-93b7-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812586
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 465bbea0-93b7-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812586
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 465bbea0-93b7-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812586
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 465bbea0-93b7-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812586
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 465bbea0-93b7-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812586
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 465bbea0-93b7-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812586
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 465bbea0-93b7-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812586
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 465bbea0-93b7-11ee-ad07-e3190f846a2a
+
+
+
diff --git a/graph/incidents_graphml/4/465c97d0-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/465c97d0-2fdb-11ed-ad03-71de3cb0a14b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f5e9c830c3a1dfb3b7ab8efc5bddb0e5f175469
--- /dev/null
+++ b/graph/incidents_graphml/4/465c97d0-2fdb-11ed-ad03-71de3cb0a14b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.20.216
+ 100.64.20.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662685434
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 465c97d0-2fdb-11ed-ad03-71de3cb0a14b
+
+
+
diff --git a/graph/incidents_graphml/4/465f08d0-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/465f08d0-2fdb-11ed-ad03-71de3cb0a14b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1efa7be211ad5ebe0aac9d6da5aff0144ebaf514
--- /dev/null
+++ b/graph/incidents_graphml/4/465f08d0-2fdb-11ed-ad03-71de3cb0a14b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.184
+ 100.64.87.184
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662685434
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 465f08d0-2fdb-11ed-ad03-71de3cb0a14b
+
+
+
diff --git a/graph/incidents_graphml/4/465f4730-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/4/465f4730-12f9-11ee-92d4-c14c0b60b700.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2c1949a83546029c70d8f0913defd4e578aaa99
--- /dev/null
+++ b/graph/incidents_graphml/4/465f4730-12f9-11ee-92d4-c14c0b60b700.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.142
+ 100.64.19.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687657233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 465f4730-12f9-11ee-92d4-c14c0b60b700
+
+
+
diff --git a/graph/incidents_graphml/4/46628b40-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/46628b40-2fdb-11ed-ad03-71de3cb0a14b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b42c72c7e34e7232d58f2ea9175c57c5313704db
--- /dev/null
+++ b/graph/incidents_graphml/4/46628b40-2fdb-11ed-ad03-71de3cb0a14b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.184
+ 100.64.87.184
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662685434
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 46628b40-2fdb-11ed-ad03-71de3cb0a14b
+
+
+
diff --git a/graph/incidents_graphml/4/4664d530-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/4664d530-2fdb-11ed-ad03-71de3cb0a14b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57ae38c646ad98840d82a8883d7319e9737a8e49
--- /dev/null
+++ b/graph/incidents_graphml/4/4664d530-2fdb-11ed-ad03-71de3cb0a14b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.158
+ 100.64.44.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662685434
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4664d530-2fdb-11ed-ad03-71de3cb0a14b
+
+
+
diff --git a/graph/incidents_graphml/4/466a0550-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/466a0550-2fdb-11ed-ad03-71de3cb0a14b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e44c8c811ba6d088b90a47a5f08b379240268f43
--- /dev/null
+++ b/graph/incidents_graphml/4/466a0550-2fdb-11ed-ad03-71de3cb0a14b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.44.158
+ 100.64.44.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662685434
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 466a0550-2fdb-11ed-ad03-71de3cb0a14b
+
+
+
diff --git a/graph/incidents_graphml/4/466d60b0-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/466d60b0-2fdb-11ed-ad03-71de3cb0a14b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e400b62a96181f6f895c328c2ac7c11676b851ed
--- /dev/null
+++ b/graph/incidents_graphml/4/466d60b0-2fdb-11ed-ad03-71de3cb0a14b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.64
+ 100.64.4.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662685434
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 466d60b0-2fdb-11ed-ad03-71de3cb0a14b
+
+
+
diff --git a/graph/incidents_graphml/4/46717f60-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/46717f60-2fdb-11ed-ad03-71de3cb0a14b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3885a657399e40c0eeed055d99ef512c073af06d
--- /dev/null
+++ b/graph/incidents_graphml/4/46717f60-2fdb-11ed-ad03-71de3cb0a14b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.4.64
+ 100.64.4.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662685434
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 46717f60-2fdb-11ed-ad03-71de3cb0a14b
+
+
+
diff --git a/graph/incidents_graphml/4/46738430-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/4/46738430-769e-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3aeec0ac66d951d0638952d31b52b55ff729d4a
--- /dev/null
+++ b/graph/incidents_graphml/4/46738430-769e-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.167
+ 100.64.20.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698613265
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46738430-769e-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/4/4675dc70-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/4/4675dc70-12f9-11ee-92d4-c14c0b60b700.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d24bba456a7af5fce322585bad616115eada825c
--- /dev/null
+++ b/graph/incidents_graphml/4/4675dc70-12f9-11ee-92d4-c14c0b60b700.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.142
+ 100.64.19.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687657233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4675dc70-12f9-11ee-92d4-c14c0b60b700
+
+
+
diff --git a/graph/incidents_graphml/4/46854fc0-45d0-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/4/46854fc0-45d0-11ee-95ea-81d84bb304b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a8283a13f5dc03785f29da0219b2d4eac5a9a5a
--- /dev/null
+++ b/graph/incidents_graphml/4/46854fc0-45d0-11ee-95ea-81d84bb304b3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.167
+ 100.64.33.167
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1693247133
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46854fc0-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247133
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46854fc0-45d0-11ee-95ea-81d84bb304b3
+
+
+
diff --git a/graph/incidents_graphml/4/468a1970-769e-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/4/468a1970-769e-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c34ba1057b7725f54804e39f717de065a92803e
--- /dev/null
+++ b/graph/incidents_graphml/4/468a1970-769e-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.167
+ 100.64.20.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698613265
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 468a1970-769e-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/4/468b8c10-3fac-11ef-931a-1d289e4afac0.graphml b/graph/incidents_graphml/4/468b8c10-3fac-11ef-931a-1d289e4afac0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b4917661113833b498617099c5b169d5ebab89d
--- /dev/null
+++ b/graph/incidents_graphml/4/468b8c10-3fac-11ef-931a-1d289e4afac0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.28.63.204
+ USER-0015-2061.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.95.155
+ 100.64.95.155
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720719462
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 468b8c10-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719462
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 468b8c10-3fac-11ef-931a-1d289e4afac0
+
+
+
diff --git a/graph/incidents_graphml/4/4690d8c0-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/4690d8c0-40ff-11ee-b8c2-77c1ecbb2825.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5cf5913b9184491caa774c0bb7982df22871b67d
--- /dev/null
+++ b/graph/incidents_graphml/4/4690d8c0-40ff-11ee-b8c2-77c1ecbb2825.graphml
@@ -0,0 +1,389 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.39.21
+ 100.64.39.21
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.70.208
+ 100.64.70.208
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.4.233
+ 100.64.4.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.32.174
+ 100.64.32.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.53.192
+ 100.64.53.192
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.13.94
+ 100.64.13.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.76
+ 100.64.18.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4690d8c0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+
diff --git a/graph/incidents_graphml/4/469370d0-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/469370d0-40ff-11ee-b8c2-77c1ecbb2825.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5688fcb186270bf4c0ce8dfbe3cd0eb60a71c40
--- /dev/null
+++ b/graph/incidents_graphml/4/469370d0-40ff-11ee-b8c2-77c1ecbb2825.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692717563
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 469370d0-40ff-11ee-b8c2-77c1ecbb2825
+
+
+
diff --git a/graph/incidents_graphml/4/4696a2c0-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/4696a2c0-391f-11ed-b85e-918b65550ba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b02c857c36f8e586510ba8a1699366bf4099e116
--- /dev/null
+++ b/graph/incidents_graphml/4/4696a2c0-391f-11ed-b85e-918b65550ba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.201
+ 100.64.77.201
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663704200
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4696a2c0-391f-11ed-b85e-918b65550ba2
+
+
+
diff --git a/graph/incidents_graphml/4/46973da0-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/4/46973da0-2f75-11ee-b11e-87149c94e410.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d3ced1613b04575e8e5f6f36b6d17c55b042291
--- /dev/null
+++ b/graph/incidents_graphml/4/46973da0-2f75-11ee-b11e-87149c94e410.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.24
+ 100.64.42.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.25
+ 100.64.42.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.26
+ 100.64.42.26
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.105
+ 100.64.14.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.27
+ 100.64.42.27
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690789123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46973da0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46973da0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46973da0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46973da0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46973da0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46973da0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46973da0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46973da0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46973da0-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46973da0-2f75-11ee-b11e-87149c94e410
+
+
+
diff --git a/graph/incidents_graphml/4/469d5980-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/469d5980-391f-11ed-b85e-918b65550ba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c77a0f0de42873cb6c220030209c0abd1095c7c
--- /dev/null
+++ b/graph/incidents_graphml/4/469d5980-391f-11ed-b85e-918b65550ba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.201
+ 100.64.77.201
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663704201
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 469d5980-391f-11ed-b85e-918b65550ba2
+
+
+
diff --git a/graph/incidents_graphml/4/46a3bf30-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/4/46a3bf30-784f-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd6820931a804f31f24a500bbe52b3d92a03a758
--- /dev/null
+++ b/graph/incidents_graphml/4/46a3bf30-784f-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.209
+ 100.64.67.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698799237
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46a3bf30-784f-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/4/46a45e60-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/46a45e60-391f-11ed-b85e-918b65550ba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..975ddd6f7d74c81f024ed0c8d1b279ca5d7d0c6f
--- /dev/null
+++ b/graph/incidents_graphml/4/46a45e60-391f-11ed-b85e-918b65550ba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.209
+ 100.64.78.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663704201
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46a45e60-391f-11ed-b85e-918b65550ba2
+
+
+
diff --git a/graph/incidents_graphml/4/46aa2ac0-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/46aa2ac0-391f-11ed-b85e-918b65550ba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af457d9ccff717997bd399d1e23a64c76a28f14f
--- /dev/null
+++ b/graph/incidents_graphml/4/46aa2ac0-391f-11ed-b85e-918b65550ba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.209
+ 100.64.78.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663704201
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 46aa2ac0-391f-11ed-b85e-918b65550ba2
+
+
+
diff --git a/graph/incidents_graphml/4/46afe7f0-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/46afe7f0-2fdb-11ed-ad03-71de3cb0a14b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b42e3b6179e2da5cdec06bf5319189b6c3b98db3
--- /dev/null
+++ b/graph/incidents_graphml/4/46afe7f0-2fdb-11ed-ad03-71de3cb0a14b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.65
+ 100.64.38.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662685434
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46afe7f0-2fdb-11ed-ad03-71de3cb0a14b
+
+
+
diff --git a/graph/incidents_graphml/4/46b4d630-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/4/46b4d630-784f-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b187495d57a23c9cc1a80ca30277af9c1136173
--- /dev/null
+++ b/graph/incidents_graphml/4/46b4d630-784f-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.209
+ 100.64.67.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698799238
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 46b4d630-784f-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/4/46b5b450-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/46b5b450-2fdb-11ed-ad03-71de3cb0a14b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..365b783e5a92c72d592abdf0686004e6df611e1b
--- /dev/null
+++ b/graph/incidents_graphml/4/46b5b450-2fdb-11ed-ad03-71de3cb0a14b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.38.65
+ 100.64.38.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662685434
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 46b5b450-2fdb-11ed-ad03-71de3cb0a14b
+
+
+
diff --git a/graph/incidents_graphml/4/46b5f550-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/46b5f550-631f-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2ca1f89cc62a6ae06e6cc8918494061d3d025f7
--- /dev/null
+++ b/graph/incidents_graphml/4/46b5f550-631f-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.240
+ 100.64.40.240
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696469647
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 46b5f550-631f-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/4/46ba4830-2fdb-11ed-ad03-71de3cb0a14b.graphml b/graph/incidents_graphml/4/46ba4830-2fdb-11ed-ad03-71de3cb0a14b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa31ce13b8c695fc43ceeaee1dd8ebd2fde3240a
--- /dev/null
+++ b/graph/incidents_graphml/4/46ba4830-2fdb-11ed-ad03-71de3cb0a14b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.167
+ 100.64.81.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1662685434
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46ba4830-2fdb-11ed-ad03-71de3cb0a14b
+
+
+
diff --git a/graph/incidents_graphml/4/46c23420-676e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/4/46c23420-676e-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a8b694f457c7afac8a1907ac7a8b5e68762ed77
--- /dev/null
+++ b/graph/incidents_graphml/4/46c23420-676e-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.131
+ 100.64.34.131
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.134
+ 100.64.11.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.122
+ 100.64.28.122
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.132
+ USER-0015-1302.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.133
+ 100.64.34.133
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.1
+ 100.64.32.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.208
+ 100.64.8.208
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.134
+ 100.64.34.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.135
+ 100.64.34.135
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.136
+ 100.64.34.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.137
+ 100.64.34.137
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.146
+ 100.64.30.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.243
+ 100.64.11.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.25
+ 100.64.32.25
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.138
+ 100.64.34.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.31
+ 100.64.28.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.41
+ 100.64.11.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.139
+ 100.64.34.139
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.140
+ 100.64.34.140
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943382
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46c23420-676e-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/4/46c3fe50-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/46c3fe50-0836-11ee-b8d0-013dce35746a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ccf64d73d21da6daf73a6b81d5e526e0f02eb83
--- /dev/null
+++ b/graph/incidents_graphml/4/46c3fe50-0836-11ee-b8d0-013dce35746a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.162
+ 100.64.65.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473970
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 46c3fe50-0836-11ee-b8d0-013dce35746a
+
+
+
diff --git a/graph/incidents_graphml/4/46c7cfa0-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/46c7cfa0-631f-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb18afed16f180d7ec5bb494d440f7d5cab6bc70
--- /dev/null
+++ b/graph/incidents_graphml/4/46c7cfa0-631f-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.122
+ 100.64.36.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696469647
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46c7cfa0-631f-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/4/46d92a00-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/46d92a00-391f-11ed-b85e-918b65550ba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1295f65e492757c9ba1478c4aa7fdd08d28398d4
--- /dev/null
+++ b/graph/incidents_graphml/4/46d92a00-391f-11ed-b85e-918b65550ba2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.30
+ 100.64.20.30
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.123
+ 100.64.71.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.229
+ 100.64.79.229
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1663704201
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46d92a00-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704201
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46d92a00-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704201
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46d92a00-391f-11ed-b85e-918b65550ba2
+
+
+ INCIDENT_LINK
+ 1663704201
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 46d92a00-391f-11ed-b85e-918b65550ba2
+
+
+
diff --git a/graph/incidents_graphml/4/46dcb730-631f-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/4/46dcb730-631f-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..292276a6a2f75e4793d773cb0c8bf7088d8bd45f
--- /dev/null
+++ b/graph/incidents_graphml/4/46dcb730-631f-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.122
+ 100.64.36.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696469648
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 46dcb730-631f-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/4/46e56a40-6ba5-11ee-adf9-937001d43276.graphml b/graph/incidents_graphml/4/46e56a40-6ba5-11ee-adf9-937001d43276.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5de0e4203580efe4dfb61caaee2b913cc223c6a9
--- /dev/null
+++ b/graph/incidents_graphml/4/46e56a40-6ba5-11ee-adf9-937001d43276.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.156
+ 100.64.38.156
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697406809
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46e56a40-6ba5-11ee-adf9-937001d43276
+
+
+
diff --git a/graph/incidents_graphml/4/46e939e0-994f-11ee-8477-4312413938e1.graphml b/graph/incidents_graphml/4/46e939e0-994f-11ee-8477-4312413938e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..655906551f94e5d878f12481aa807103fbecc53b
--- /dev/null
+++ b/graph/incidents_graphml/4/46e939e0-994f-11ee-8477-4312413938e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.164
+ 100.64.10.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702427626
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46e939e0-994f-11ee-8477-4312413938e1
+
+
+
diff --git a/graph/incidents_graphml/4/46fdad30-6ba5-11ee-adf9-937001d43276.graphml b/graph/incidents_graphml/4/46fdad30-6ba5-11ee-adf9-937001d43276.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57282ee9aeb7d3908289435d7083fa27ec2d0fe5
--- /dev/null
+++ b/graph/incidents_graphml/4/46fdad30-6ba5-11ee-adf9-937001d43276.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.158
+ 100.64.38.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697406810
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 46fdad30-6ba5-11ee-adf9-937001d43276
+
+
+
diff --git a/graph/incidents_graphml/4/470a06c0-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/470a06c0-d383-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..854819ae0de79aa20fd2c6432dce6db99af29c60
--- /dev/null
+++ b/graph/incidents_graphml/4/470a06c0-d383-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.197
+ 100.64.22.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708827128
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 470a06c0-d383-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/470e8710-17e8-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/4/470e8710-17e8-11ee-9bb9-61e0b388f5c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3694d3d1142157f0bc1f135a2a7d040780765e8
--- /dev/null
+++ b/graph/incidents_graphml/4/470e8710-17e8-11ee-9bb9-61e0b388f5c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.159
+ 100.64.88.159
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688199688
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 470e8710-17e8-11ee-9bb9-61e0b388f5c0
+
+
+
diff --git a/graph/incidents_graphml/4/47165330-2244-11ee-a208-019103756a24.graphml b/graph/incidents_graphml/4/47165330-2244-11ee-a208-019103756a24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11e01bd7fc0f74c83c1269309602aaf464efe0c3
--- /dev/null
+++ b/graph/incidents_graphml/4/47165330-2244-11ee-a208-019103756a24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.188
+ USER-0015-1353.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689338714
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 47165330-2244-11ee-a208-019103756a24
+
+
+
diff --git a/graph/incidents_graphml/4/472199e0-17e8-11ee-9bb9-61e0b388f5c0.graphml b/graph/incidents_graphml/4/472199e0-17e8-11ee-9bb9-61e0b388f5c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad8e921e2de16b622030bb52fcf3e14cd8c1db77
--- /dev/null
+++ b/graph/incidents_graphml/4/472199e0-17e8-11ee-9bb9-61e0b388f5c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.159
+ 100.64.88.159
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688199688
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 472199e0-17e8-11ee-9bb9-61e0b388f5c0
+
+
+
diff --git a/graph/incidents_graphml/4/47257e00-d383-11ee-8aee-79d3d013c637.graphml b/graph/incidents_graphml/4/47257e00-d383-11ee-8aee-79d3d013c637.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61c117442e5730434edee9ba695b099332fb36fc
--- /dev/null
+++ b/graph/incidents_graphml/4/47257e00-d383-11ee-8aee-79d3d013c637.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.197
+ 100.64.22.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708827128
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 47257e00-d383-11ee-8aee-79d3d013c637
+
+
+
diff --git a/graph/incidents_graphml/4/4729e040-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/4729e040-7e0f-11ee-8917-8796f098c594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..322ad819dd0c5c88a1f5a5e545fd24af3c166ad4
--- /dev/null
+++ b/graph/incidents_graphml/4/4729e040-7e0f-11ee-8917-8796f098c594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.133
+ 100.64.58.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699431457
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4729e040-7e0f-11ee-8917-8796f098c594
+
+
+
diff --git a/graph/incidents_graphml/4/47379be0-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/47379be0-7e0f-11ee-8917-8796f098c594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..900451e50059a741cdaeeb941c308a09c80370cd
--- /dev/null
+++ b/graph/incidents_graphml/4/47379be0-7e0f-11ee-8917-8796f098c594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.135
+ 100.64.58.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699431458
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47379be0-7e0f-11ee-8917-8796f098c594
+
+
+
diff --git a/graph/incidents_graphml/4/4741b240-f96e-11ed-abbc-bf3a0fdc2e0e.graphml b/graph/incidents_graphml/4/4741b240-f96e-11ed-abbc-bf3a0fdc2e0e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6770e7fbfddc32ce1e858b79ccacee6cbca0ae11
--- /dev/null
+++ b/graph/incidents_graphml/4/4741b240-f96e-11ed-abbc-bf3a0fdc2e0e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.177
+ 100.64.69.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684848755
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4741b240-f96e-11ed-abbc-bf3a0fdc2e0e
+
+
+
diff --git a/graph/incidents_graphml/4/4744e250-7e0f-11ee-8917-8796f098c594.graphml b/graph/incidents_graphml/4/4744e250-7e0f-11ee-8917-8796f098c594.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f23e6065999e05810b4109001ed2d0a614b0f09
--- /dev/null
+++ b/graph/incidents_graphml/4/4744e250-7e0f-11ee-8917-8796f098c594.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.135
+ 100.64.58.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699431458
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4744e250-7e0f-11ee-8917-8796f098c594
+
+
+
diff --git a/graph/incidents_graphml/4/4757ba10-94e4-11ee-b216-b792b1d50feb.graphml b/graph/incidents_graphml/4/4757ba10-94e4-11ee-b216-b792b1d50feb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..441f77e6a09425922e8502f48ce14584cf5730e1
--- /dev/null
+++ b/graph/incidents_graphml/4/4757ba10-94e4-11ee-b216-b792b1d50feb.graphml
@@ -0,0 +1,315 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.155
+ 100.64.26.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.126
+ 100.64.25.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.156
+ 100.64.26.156
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.157
+ 100.64.26.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.50
+ 100.64.18.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.158
+ 100.64.26.158
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.159
+ 100.64.26.159
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.236
+ 100.64.19.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941866
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4757ba10-94e4-11ee-b216-b792b1d50feb
+
+
+
diff --git a/graph/incidents_graphml/4/475922b0-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/475922b0-9ff2-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c8ff4f141f20f414db24e1e378e9235895ab4b8
--- /dev/null
+++ b/graph/incidents_graphml/4/475922b0-9ff2-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.148
+ 100.64.48.148
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703157342
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 475922b0-9ff2-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/475d1280-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/475d1280-6ab9-11ee-a026-19c00241440b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..223e6cac455b229a52229377971050dbb6f23ff0
--- /dev/null
+++ b/graph/incidents_graphml/4/475d1280-6ab9-11ee-a026-19c00241440b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.202
+ 100.64.46.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697305449
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 475d1280-6ab9-11ee-a026-19c00241440b
+
+
+
diff --git a/graph/incidents_graphml/4/4767a1a0-9ff2-11ee-b57e-09f55271957e.graphml b/graph/incidents_graphml/4/4767a1a0-9ff2-11ee-b57e-09f55271957e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34c389980735962e71a409d5a3ff5ddf7fd767ab
--- /dev/null
+++ b/graph/incidents_graphml/4/4767a1a0-9ff2-11ee-b57e-09f55271957e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.148
+ 100.64.48.148
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703157342
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4767a1a0-9ff2-11ee-b57e-09f55271957e
+
+
+
diff --git a/graph/incidents_graphml/4/47682390-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/47682390-391f-11ed-b85e-918b65550ba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..224bc11a94ff390207123e78eb1835ae5fdaadd5
--- /dev/null
+++ b/graph/incidents_graphml/4/47682390-391f-11ed-b85e-918b65550ba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.230
+ 100.64.79.230
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663704202
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47682390-391f-11ed-b85e-918b65550ba2
+
+
+
diff --git a/graph/incidents_graphml/4/476a7eb0-2824-11ef-b581-4d62d2263ef1.graphml b/graph/incidents_graphml/4/476a7eb0-2824-11ef-b581-4d62d2263ef1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8eadf827feafbee4a538b8f86fecc4d5f0362a57
--- /dev/null
+++ b/graph/incidents_graphml/4/476a7eb0-2824-11ef-b581-4d62d2263ef1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.59.91
+ 172.30.59.91
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.227
+ 100.64.89.227
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718132175
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 476a7eb0-2824-11ef-b581-4d62d2263ef1
+
+
+ INCIDENT_LINK
+ 1718132175
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 476a7eb0-2824-11ef-b581-4d62d2263ef1
+
+
+
diff --git a/graph/incidents_graphml/4/476bb880-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/476bb880-6ab9-11ee-a026-19c00241440b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd9db70e043a9a48bd236b768f6d296f3e432b0e
--- /dev/null
+++ b/graph/incidents_graphml/4/476bb880-6ab9-11ee-a026-19c00241440b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.202
+ 100.64.46.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697305449
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 476bb880-6ab9-11ee-a026-19c00241440b
+
+
+
diff --git a/graph/incidents_graphml/4/476da1d0-391f-11ed-b85e-918b65550ba2.graphml b/graph/incidents_graphml/4/476da1d0-391f-11ed-b85e-918b65550ba2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4aef75654e173a45b7cca2a198c0a7e04673ce6
--- /dev/null
+++ b/graph/incidents_graphml/4/476da1d0-391f-11ed-b85e-918b65550ba2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.230
+ 100.64.79.230
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1663704202
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 476da1d0-391f-11ed-b85e-918b65550ba2
+
+
+
diff --git a/graph/incidents_graphml/4/4781dca0-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4781dca0-2cc0-11ee-9ea2-17c9a8b72baa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ab571cbb1d348ba452c751c9a35a719c457e628
--- /dev/null
+++ b/graph/incidents_graphml/4/4781dca0-2cc0-11ee-9ea2-17c9a8b72baa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.216
+ 100.64.42.216
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690491484
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4781dca0-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+
diff --git a/graph/incidents_graphml/4/4782e8a0-7920-11ee-91ac-9dbe9218e297.graphml b/graph/incidents_graphml/4/4782e8a0-7920-11ee-91ac-9dbe9218e297.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b1bda88b1935bb6a097932df279cff9c1c7c906c
--- /dev/null
+++ b/graph/incidents_graphml/4/4782e8a0-7920-11ee-91ac-9dbe9218e297.graphml
@@ -0,0 +1,817 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.248
+ 100.64.69.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.250
+ 100.64.69.250
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.41.6
+ 100.64.41.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.251
+ 100.64.69.251
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.7.75
+ 100.64.7.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.40.143
+ 100.64.40.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.252
+ 100.64.69.252
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+ INCIDENT_LINK
+ 1698889004
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4782e8a0-7920-11ee-91ac-9dbe9218e297
+
+
+
diff --git a/graph/incidents_graphml/4/47835f30-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47835f30-6ab9-11ee-a026-19c00241440b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fdcc18f8fef1752001ea99db4d123a7a3c5c0dcc
--- /dev/null
+++ b/graph/incidents_graphml/4/47835f30-6ab9-11ee-a026-19c00241440b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.202
+ 100.64.46.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697305449
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47835f30-6ab9-11ee-a026-19c00241440b
+
+
+
diff --git a/graph/incidents_graphml/4/478aecc0-5793-11ee-97ff-3b19ab007f30.graphml b/graph/incidents_graphml/4/478aecc0-5793-11ee-97ff-3b19ab007f30.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..acf650ee8eb7f43534ea9a4cd51de0c78b85d2c0
--- /dev/null
+++ b/graph/incidents_graphml/4/478aecc0-5793-11ee-97ff-3b19ab007f30.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.96
+ 100.64.69.96
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1695200056
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 478aecc0-5793-11ee-97ff-3b19ab007f30
+
+
+ INCIDENT_LINK
+ 1695200056
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 478aecc0-5793-11ee-97ff-3b19ab007f30
+
+
+
diff --git a/graph/incidents_graphml/4/479364c0-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/479364c0-6ab9-11ee-a026-19c00241440b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4eecea67e947d730a0e929c4e74e9b41a1ce6c07
--- /dev/null
+++ b/graph/incidents_graphml/4/479364c0-6ab9-11ee-a026-19c00241440b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.202
+ 100.64.46.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697305449
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 479364c0-6ab9-11ee-a026-19c00241440b
+
+
+
diff --git a/graph/incidents_graphml/4/4798e710-2cc0-11ee-9ea2-17c9a8b72baa.graphml b/graph/incidents_graphml/4/4798e710-2cc0-11ee-9ea2-17c9a8b72baa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f98dea189200880198807bb27bcad14aa11b999
--- /dev/null
+++ b/graph/incidents_graphml/4/4798e710-2cc0-11ee-9ea2-17c9a8b72baa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.216
+ 100.64.42.216
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690491484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4798e710-2cc0-11ee-9ea2-17c9a8b72baa
+
+
+
diff --git a/graph/incidents_graphml/4/47a258e0-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47a258e0-6ab9-11ee-a026-19c00241440b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06553e2eeb41ff617ea6693f461148542c1b8dcc
--- /dev/null
+++ b/graph/incidents_graphml/4/47a258e0-6ab9-11ee-a026-19c00241440b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.202
+ 100.64.46.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697305449
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47a258e0-6ab9-11ee-a026-19c00241440b
+
+
+
diff --git a/graph/incidents_graphml/4/47ab08b0-718e-11ee-9fe3-bf96143a208f.graphml b/graph/incidents_graphml/4/47ab08b0-718e-11ee-9fe3-bf96143a208f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a34daee918bd6831bfd99e3edd225a6281a1acf
--- /dev/null
+++ b/graph/incidents_graphml/4/47ab08b0-718e-11ee-9fe3-bf96143a208f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.105
+ 100.64.68.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1698056639
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47ab08b0-718e-11ee-9fe3-bf96143a208f
+
+
+ INCIDENT_LINK
+ 1698056639
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47ab08b0-718e-11ee-9fe3-bf96143a208f
+
+
+
diff --git a/graph/incidents_graphml/4/47ae5160-085a-11ef-81c9-bbab78bb4e36.graphml b/graph/incidents_graphml/4/47ae5160-085a-11ef-81c9-bbab78bb4e36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2cb0283f621c79735e402b2c8cd8f26c5e96f0dd
--- /dev/null
+++ b/graph/incidents_graphml/4/47ae5160-085a-11ef-81c9-bbab78bb4e36.graphml
@@ -0,0 +1,545 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.67
+ 100.64.49.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.82
+ 100.64.64.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.200
+ 100.64.14.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.248
+ USER-0015-1221.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.199
+ 100.64.97.199
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.169
+ USER-0015-2178.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.200
+ 100.64.97.200
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.94
+ 100.64.51.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ HOST
+ 100.64.97.201
+ 100.64.97.201
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.163
+ 100.64.88.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.74
+ 100.64.95.74
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.51
+ 100.64.23.51
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.15.1
+ 100.64.15.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+ INCIDENT_LINK
+ 1714636931
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ae5160-085a-11ef-81c9-bbab78bb4e36
+
+
+
diff --git a/graph/incidents_graphml/4/47b70cc0-18e9-11ef-94b0-d3858c4ed3ac.graphml b/graph/incidents_graphml/4/47b70cc0-18e9-11ef-94b0-d3858c4ed3ac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ddfc6c88a246be9c5254c109634722d18828758e
--- /dev/null
+++ b/graph/incidents_graphml/4/47b70cc0-18e9-11ef-94b0-d3858c4ed3ac.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.119.135.83
+ 10.119.135.83
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.0.149
+ 100.64.0.149
+ ["Exploiting Target"]
+ 0.8734375
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.0.61
+ 100.64.0.61
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1716457568
+ malicious
+ 0.8734375
+ 0.8734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47b70cc0-18e9-11ef-94b0-d3858c4ed3ac
+
+
+ INCIDENT_LINK
+ 1716457568
+ malicious
+ 0.8734375
+ 0.8734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47b70cc0-18e9-11ef-94b0-d3858c4ed3ac
+
+
+ INCIDENT_LINK
+ 1716457568
+ malicious
+ 0.8734375
+ 0.8734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47b70cc0-18e9-11ef-94b0-d3858c4ed3ac
+
+
+ INCIDENT_LINK
+ 1716457568
+ malicious
+ 0.8734375
+ 0.8734375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47b70cc0-18e9-11ef-94b0-d3858c4ed3ac
+
+
+
diff --git a/graph/incidents_graphml/4/47b7d430-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/47b7d430-0836-11ee-b8d0-013dce35746a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e11fde42bf2561ef59f6898da75b630f0ca0ada0
--- /dev/null
+++ b/graph/incidents_graphml/4/47b7d430-0836-11ee-b8d0-013dce35746a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.116
+ 100.64.30.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473972
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47b7d430-0836-11ee-b8d0-013dce35746a
+
+
+
diff --git a/graph/incidents_graphml/4/47b7dcb0-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47b7dcb0-6ab9-11ee-a026-19c00241440b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7cff2fe34ce6a9066006eb9a7a2f224a15b2fc3
--- /dev/null
+++ b/graph/incidents_graphml/4/47b7dcb0-6ab9-11ee-a026-19c00241440b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.202
+ 100.64.46.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697305450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 47b7dcb0-6ab9-11ee-a026-19c00241440b
+
+
+
diff --git a/graph/incidents_graphml/4/47ba4a10-7c46-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/4/47ba4a10-7c46-11ee-b44e-cd55abd836ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3952f2a4e838c2f8d2a27ca2fb12b3d13051f2b1
--- /dev/null
+++ b/graph/incidents_graphml/4/47ba4a10-7c46-11ee-b44e-cd55abd836ec.graphml
@@ -0,0 +1,777 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.196
+ 100.64.15.196
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.44
+ 100.64.65.44
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.45
+ 100.64.65.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.14
+ 100.64.57.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.198
+ 100.64.47.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.46
+ 100.64.65.46
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.52
+ 100.64.29.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.134
+ 100.64.12.134
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.72
+ 100.64.39.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.131
+ 100.64.58.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.47
+ 100.64.65.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.48
+ 100.64.65.48
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.70
+ 100.64.14.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.57
+ 100.64.28.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47ba4a10-7c46-11ee-b44e-cd55abd836ec
+
+
+
diff --git a/graph/incidents_graphml/4/47c04040-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/47c04040-dba2-11ed-8f69-23b0b50da3c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db8a45adab4437279c660f4cd941ad2104d98553
--- /dev/null
+++ b/graph/incidents_graphml/4/47c04040-dba2-11ed-8f69-23b0b50da3c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.186
+ 100.64.75.186
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681572555
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47c04040-dba2-11ed-8f69-23b0b50da3c2
+
+
+
diff --git a/graph/incidents_graphml/4/47c1dec0-f96e-11ed-abbc-bf3a0fdc2e0e.graphml b/graph/incidents_graphml/4/47c1dec0-f96e-11ed-abbc-bf3a0fdc2e0e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f780aa46d6dd655c9a1a942bdc423a59fb019f5
--- /dev/null
+++ b/graph/incidents_graphml/4/47c1dec0-f96e-11ed-abbc-bf3a0fdc2e0e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.45.252
+ 100.64.45.252
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684848756
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 47c1dec0-f96e-11ed-abbc-bf3a0fdc2e0e
+
+
+
diff --git a/graph/incidents_graphml/4/47c410d0-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/47c410d0-dba2-11ed-8f69-23b0b50da3c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..615dc493ebafeab68568a45fcc2f982857da4894
--- /dev/null
+++ b/graph/incidents_graphml/4/47c410d0-dba2-11ed-8f69-23b0b50da3c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.75.186
+ 100.64.75.186
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1681572555
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 47c410d0-dba2-11ed-8f69-23b0b50da3c2
+
+
+
diff --git a/graph/incidents_graphml/4/47c4cb90-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/47c4cb90-4e4a-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..515f9d13ab8b04bfa157881a3ea7396030a73e59
--- /dev/null
+++ b/graph/incidents_graphml/4/47c4cb90-4e4a-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.103
+ 100.64.58.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694179143
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47c4cb90-4e4a-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/4/47c65ac0-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/47c65ac0-dba2-11ed-8f69-23b0b50da3c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e586cfd5164e50124b4540f5cf526e54c61535c1
--- /dev/null
+++ b/graph/incidents_graphml/4/47c65ac0-dba2-11ed-8f69-23b0b50da3c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.8
+ 100.64.76.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681572555
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47c65ac0-dba2-11ed-8f69-23b0b50da3c2
+
+
+
diff --git a/graph/incidents_graphml/4/47c6af50-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/47c6af50-7726-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f59b7e9359fd6628fb99602a556367e1fb60b126
--- /dev/null
+++ b/graph/incidents_graphml/4/47c6af50-7726-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.96
+ 100.64.64.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698671679
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47c6af50-7726-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/4/47c9b360-7c46-11ee-b44e-cd55abd836ec.graphml b/graph/incidents_graphml/4/47c9b360-7c46-11ee-b44e-cd55abd836ec.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..734ef6b59b410a85e593486d5d15b904b75c9442
--- /dev/null
+++ b/graph/incidents_graphml/4/47c9b360-7c46-11ee-b44e-cd55abd836ec.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.196
+ 100.64.15.196
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699235178
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 47c9b360-7c46-11ee-b44e-cd55abd836ec
+
+
+
diff --git a/graph/incidents_graphml/4/47ca0440-dba2-11ed-8f69-23b0b50da3c2.graphml b/graph/incidents_graphml/4/47ca0440-dba2-11ed-8f69-23b0b50da3c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..954200f203ee00fc0b0fd2588313248453869ea5
--- /dev/null
+++ b/graph/incidents_graphml/4/47ca0440-dba2-11ed-8f69-23b0b50da3c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.76.8
+ 100.64.76.8
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681572555
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 47ca0440-dba2-11ed-8f69-23b0b50da3c2
+
+
+
diff --git a/graph/incidents_graphml/4/47ca6a40-f96e-11ed-abbc-bf3a0fdc2e0e.graphml b/graph/incidents_graphml/4/47ca6a40-f96e-11ed-abbc-bf3a0fdc2e0e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b0a9b54067a61581e32bfc2bf75d681dc99e7ac
--- /dev/null
+++ b/graph/incidents_graphml/4/47ca6a40-f96e-11ed-abbc-bf3a0fdc2e0e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.20.30
+ 100.64.20.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684848756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 47ca6a40-f96e-11ed-abbc-bf3a0fdc2e0e
+
+
+
diff --git a/graph/incidents_graphml/4/47cc9d30-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47cc9d30-6ab9-11ee-a026-19c00241440b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8405c7697e5c519c97f017976c898b9724709f06
--- /dev/null
+++ b/graph/incidents_graphml/4/47cc9d30-6ab9-11ee-a026-19c00241440b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.202
+ 100.64.46.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697305450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47cc9d30-6ab9-11ee-a026-19c00241440b
+
+
+
diff --git a/graph/incidents_graphml/4/47d4e020-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/47d4e020-7726-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c21991c5620427f073dddf4616ac5582910e1fb3
--- /dev/null
+++ b/graph/incidents_graphml/4/47d4e020-7726-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.96
+ 100.64.64.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698671679
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 47d4e020-7726-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/4/47d52030-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/47d52030-0836-11ee-b8d0-013dce35746a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39a1f5ad04e0f66139a89c8aefcac9fa1995feee
--- /dev/null
+++ b/graph/incidents_graphml/4/47d52030-0836-11ee-b8d0-013dce35746a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.116
+ 100.64.30.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473972
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 47d52030-0836-11ee-b8d0-013dce35746a
+
+
+
diff --git a/graph/incidents_graphml/4/47d98ee0-cf69-11ee-91bc-e1cf8103bf6f.graphml b/graph/incidents_graphml/4/47d98ee0-cf69-11ee-91bc-e1cf8103bf6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6a4fc898bb3adfb1c4187a4bd6da60ab69fa148
--- /dev/null
+++ b/graph/incidents_graphml/4/47d98ee0-cf69-11ee-91bc-e1cf8103bf6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.53
+ 100.64.33.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708376157
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47d98ee0-cf69-11ee-91bc-e1cf8103bf6f
+
+
+
diff --git a/graph/incidents_graphml/4/47dbdf70-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47dbdf70-6ab9-11ee-a026-19c00241440b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a3f61db93f0f7298975a827ca0c19958583ba72
--- /dev/null
+++ b/graph/incidents_graphml/4/47dbdf70-6ab9-11ee-a026-19c00241440b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.202
+ 100.64.46.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697305450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 47dbdf70-6ab9-11ee-a026-19c00241440b
+
+
+
diff --git a/graph/incidents_graphml/4/47dcc060-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/47dcc060-4e4a-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc9b8fa0923481cf0a4f6b7449dd204bb5531ef3
--- /dev/null
+++ b/graph/incidents_graphml/4/47dcc060-4e4a-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.103
+ 100.64.58.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694179143
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 47dcc060-4e4a-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/4/47e12b60-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/4/47e12b60-fb83-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b21feba6d00261ac297fe78dc4906c11aa133d0a
--- /dev/null
+++ b/graph/incidents_graphml/4/47e12b60-fb83-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.20
+ 100.64.41.20
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685077678
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47e12b60-fb83-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/4/47e3d440-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/47e3d440-7726-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f1912c1d84c2902b8bc028b7bededb5cb4b97e4
--- /dev/null
+++ b/graph/incidents_graphml/4/47e3d440-7726-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.98
+ 100.64.64.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698671679
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 47e3d440-7726-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/4/47e5bbb0-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/47e5bbb0-13f8-11ef-b4e0-63669a8fd788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95818e1da98672d9386293171f237193b7c2472b
--- /dev/null
+++ b/graph/incidents_graphml/4/47e5bbb0-13f8-11ef-b4e0-63669a8fd788.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.165
+ 100.64.31.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715914255
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47e5bbb0-13f8-11ef-b4e0-63669a8fd788
+
+
+
diff --git a/graph/incidents_graphml/4/47e80120-fc46-11ec-b1da-11e6c916d75e.graphml b/graph/incidents_graphml/4/47e80120-fc46-11ec-b1da-11e6c916d75e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4392d2cde2dab4cf11d727ad7b64369bcaba6f66
--- /dev/null
+++ b/graph/incidents_graphml/4/47e80120-fc46-11ec-b1da-11e6c916d75e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.12
+ 100.64.83.12
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.159
+ 100.64.1.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.13
+ 100.64.83.13
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657013932
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47e80120-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013932
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47e80120-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013932
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47e80120-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013932
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47e80120-fc46-11ec-b1da-11e6c916d75e
+
+
+
diff --git a/graph/incidents_graphml/4/47e96d60-cf69-11ee-91bc-e1cf8103bf6f.graphml b/graph/incidents_graphml/4/47e96d60-cf69-11ee-91bc-e1cf8103bf6f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4338c909221b4956890e75fc968f89469606f95
--- /dev/null
+++ b/graph/incidents_graphml/4/47e96d60-cf69-11ee-91bc-e1cf8103bf6f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.53
+ 100.64.33.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708376158
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 47e96d60-cf69-11ee-91bc-e1cf8103bf6f
+
+
+
diff --git a/graph/incidents_graphml/4/47eaec20-5909-11ee-a459-5b20d657705e.graphml b/graph/incidents_graphml/4/47eaec20-5909-11ee-a459-5b20d657705e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3bf93725c79f51af499983e0779ab5669d87cd03
--- /dev/null
+++ b/graph/incidents_graphml/4/47eaec20-5909-11ee-a459-5b20d657705e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.247
+ 100.64.60.247
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360689
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 47eaec20-5909-11ee-a459-5b20d657705e
+
+
+
diff --git a/graph/incidents_graphml/4/47eb48c0-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47eb48c0-6ab9-11ee-a026-19c00241440b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3937ecece1b1d0b1b819545009b3d243191d6ea6
--- /dev/null
+++ b/graph/incidents_graphml/4/47eb48c0-6ab9-11ee-a026-19c00241440b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.202
+ 100.64.46.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697305450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47eb48c0-6ab9-11ee-a026-19c00241440b
+
+
+
diff --git a/graph/incidents_graphml/4/47f37c10-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/4/47f37c10-0a43-11ee-bdb0-15a1612d17d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d26c5556b6dd7e3834f7a5b40ea7a68dedc8905a
--- /dev/null
+++ b/graph/incidents_graphml/4/47f37c10-0a43-11ee-bdb0-15a1612d17d2.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.74
+ 100.64.30.74
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.182
+ 100.64.16.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.75
+ 100.64.30.75
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47f37c10-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47f37c10-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47f37c10-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47f37c10-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47f37c10-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47f37c10-0a43-11ee-bdb0-15a1612d17d2
+
+
+
diff --git a/graph/incidents_graphml/4/47f3cad0-4e4a-11ee-81da-13947cfea124.graphml b/graph/incidents_graphml/4/47f3cad0-4e4a-11ee-81da-13947cfea124.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d172b43fac965b04d187d914fa8b4b9f00b8421
--- /dev/null
+++ b/graph/incidents_graphml/4/47f3cad0-4e4a-11ee-81da-13947cfea124.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.18
+ 100.64.26.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694179143
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 47f3cad0-4e4a-11ee-81da-13947cfea124
+
+
+
diff --git a/graph/incidents_graphml/4/47f5eea0-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/47f5eea0-0836-11ee-b8d0-013dce35746a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..37e8964e4e6a4e4c5c5feb971af1972a13712a2d
--- /dev/null
+++ b/graph/incidents_graphml/4/47f5eea0-0836-11ee-b8d0-013dce35746a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.168
+ 100.64.42.168
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473972
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 47f5eea0-0836-11ee-b8d0-013dce35746a
+
+
+
diff --git a/graph/incidents_graphml/4/47f6aba0-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/47f6aba0-13f8-11ef-b4e0-63669a8fd788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f71f33b0dd33992a54aaeed7e1b61e177648490
--- /dev/null
+++ b/graph/incidents_graphml/4/47f6aba0-13f8-11ef-b4e0-63669a8fd788.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.165
+ 100.64.31.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715914255
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 47f6aba0-13f8-11ef-b4e0-63669a8fd788
+
+
+
diff --git a/graph/incidents_graphml/4/47fa3ce0-6ab9-11ee-a026-19c00241440b.graphml b/graph/incidents_graphml/4/47fa3ce0-6ab9-11ee-a026-19c00241440b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c24427ab1d902b027e6123caa484d9ef7a02c00
--- /dev/null
+++ b/graph/incidents_graphml/4/47fa3ce0-6ab9-11ee-a026-19c00241440b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.202
+ 100.64.46.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697305450
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 47fa3ce0-6ab9-11ee-a026-19c00241440b
+
+
+
diff --git a/graph/incidents_graphml/4/47fd43c0-2ade-11ed-961c-99a30b1a3145.graphml b/graph/incidents_graphml/4/47fd43c0-2ade-11ed-961c-99a30b1a3145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f953469b0003cff7b105ed34c9eea7fe30ad79d
--- /dev/null
+++ b/graph/incidents_graphml/4/47fd43c0-2ade-11ed-961c-99a30b1a3145.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.2
+ 100.64.83.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.237
+ 100.64.71.237
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.118
+ 100.64.72.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.115
+ 100.64.72.115
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662136969
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47fd43c0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136969
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47fd43c0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136969
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47fd43c0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136969
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47fd43c0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136969
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47fd43c0-2ade-11ed-961c-99a30b1a3145
+
+
+ INCIDENT_LINK
+ 1662136969
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 47fd43c0-2ade-11ed-961c-99a30b1a3145
+
+
+
diff --git a/graph/incidents_graphml/4/48025a80-ecdf-11ee-ac0b-e5fde63aeb72.graphml b/graph/incidents_graphml/4/48025a80-ecdf-11ee-ac0b-e5fde63aeb72.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..273cb050a14a136e244ed2fba01078421f595a2a
--- /dev/null
+++ b/graph/incidents_graphml/4/48025a80-ecdf-11ee-ac0b-e5fde63aeb72.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.207
+ 100.64.68.207
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ INCIDENT_LINK
+ 1711615422
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 48025a80-ecdf-11ee-ac0b-e5fde63aeb72
+
+
+ INCIDENT_LINK
+ 1711615422
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 48025a80-ecdf-11ee-ac0b-e5fde63aeb72
+
+
+
diff --git a/graph/incidents_graphml/4/48036a30-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/48036a30-7726-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..31fc5d12c559f8b54bca82f0ed299a23dc9a92e8
--- /dev/null
+++ b/graph/incidents_graphml/4/48036a30-7726-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.149
+ 100.64.9.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698671679
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48036a30-7726-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/4/48039ba0-5e3f-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/4/48039ba0-5e3f-11ed-95e5-b5536252f217.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff85c78579bb8eed900e99a3c1b4527c6ef42d48
--- /dev/null
+++ b/graph/incidents_graphml/4/48039ba0-5e3f-11ed-95e5-b5536252f217.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.32
+ 100.64.78.32
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.28
+ USER-0015-1750.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1667786140
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48039ba0-5e3f-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667786140
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48039ba0-5e3f-11ed-95e5-b5536252f217
+
+
+
diff --git a/graph/incidents_graphml/4/48054950-5e3f-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/4/48054950-5e3f-11ed-95e5-b5536252f217.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24f9689a264ec7d5ef57d7625581806b8945fcde
--- /dev/null
+++ b/graph/incidents_graphml/4/48054950-5e3f-11ed-95e5-b5536252f217.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.34
+ 100.64.78.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.78.35
+ 100.64.78.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1667786140
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48054950-5e3f-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667786140
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48054950-5e3f-11ed-95e5-b5536252f217
+
+
+
diff --git a/graph/incidents_graphml/4/480afbb0-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/4/480afbb0-0a43-11ee-bdb0-15a1612d17d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f1755072cfb60c43ae64f7cacfd521a3e44cfe2
--- /dev/null
+++ b/graph/incidents_graphml/4/480afbb0-0a43-11ee-bdb0-15a1612d17d2.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.78
+ 100.64.30.78
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.2
+ 100.64.18.2
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.79
+ 100.64.30.79
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 480afbb0-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 480afbb0-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 480afbb0-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 480afbb0-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 480afbb0-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 480afbb0-0a43-11ee-bdb0-15a1612d17d2
+
+
+
diff --git a/graph/incidents_graphml/4/480c0710-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/480c0710-40ff-11ee-b8c2-77c1ecbb2825.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8da04d8dc5eeb3648dea98de830b2921c7917ac1
--- /dev/null
+++ b/graph/incidents_graphml/4/480c0710-40ff-11ee-b8c2-77c1ecbb2825.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.133
+ 100.64.47.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1692717566
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 480c0710-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717566
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 480c0710-40ff-11ee-b8c2-77c1ecbb2825
+
+
+ INCIDENT_LINK
+ 1692717566
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 480c0710-40ff-11ee-b8c2-77c1ecbb2825
+
+
+
diff --git a/graph/incidents_graphml/4/480eda40-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/4/480eda40-0c1a-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd3a877b6b9cf029b07150c855e65bed5d70348a
--- /dev/null
+++ b/graph/incidents_graphml/4/480eda40-0c1a-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.76
+ 100.64.62.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.230
+ 100.64.72.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686901751
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 480eda40-0c1a-11ee-a535-110da53c9d07
+
+
+ INCIDENT_LINK
+ 1686901751
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 480eda40-0c1a-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/4/4810d7b0-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/4/4810d7b0-7726-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7303fd3d0d9477282b71a1f07b3b2bb614bf946
--- /dev/null
+++ b/graph/incidents_graphml/4/4810d7b0-7726-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.149
+ 100.64.9.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698671679
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4810d7b0-7726-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/4/4810faa0-2f9c-11ee-812f-67af952e62fd.graphml b/graph/incidents_graphml/4/4810faa0-2f9c-11ee-812f-67af952e62fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b3c773d76d9eb149f2943d3a753973afa8d9dde
--- /dev/null
+++ b/graph/incidents_graphml/4/4810faa0-2f9c-11ee-812f-67af952e62fd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690805876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4810faa0-2f9c-11ee-812f-67af952e62fd
+
+
+ INCIDENT_LINK
+ 1690805876
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4810faa0-2f9c-11ee-812f-67af952e62fd
+
+
+
diff --git a/graph/incidents_graphml/4/48153670-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/48153670-0836-11ee-b8d0-013dce35746a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a98281ad52796c1ca9ada7fd9fc8db0a9f112b9d
--- /dev/null
+++ b/graph/incidents_graphml/4/48153670-0836-11ee-b8d0-013dce35746a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.168
+ 100.64.42.168
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473972
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48153670-0836-11ee-b8d0-013dce35746a
+
+
+
diff --git a/graph/incidents_graphml/4/4815f220-40ff-11ee-b8c2-77c1ecbb2825.graphml b/graph/incidents_graphml/4/4815f220-40ff-11ee-b8c2-77c1ecbb2825.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9ae7e8f753fe3016aff2ef5203b7eb8dfcc668c
--- /dev/null
+++ b/graph/incidents_graphml/4/4815f220-40ff-11ee-b8c2-77c1ecbb2825.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.47.133
+ 100.64.47.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692717566
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 4815f220-40ff-11ee-b8c2-77c1ecbb2825
+
+
+
diff --git a/graph/incidents_graphml/4/48184730-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/4/48184730-0948-11ee-899e-3d5be197ab3b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6502787531681fa813f3215f1adba189e40b6562
--- /dev/null
+++ b/graph/incidents_graphml/4/48184730-0948-11ee-899e-3d5be197ab3b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.200
+ 100.64.72.200
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.59.195
+ 100.64.59.195
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.51.208
+ 100.64.51.208
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686591654
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48184730-0948-11ee-899e-3d5be197ab3b
+
+
+ INCIDENT_LINK
+ 1686591654
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48184730-0948-11ee-899e-3d5be197ab3b
+
+
+ INCIDENT_LINK
+ 1686591654
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48184730-0948-11ee-899e-3d5be197ab3b
+
+
+ INCIDENT_LINK
+ 1686591654
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48184730-0948-11ee-899e-3d5be197ab3b
+
+
+
diff --git a/graph/incidents_graphml/4/481986c0-676e-11ee-acda-6b17f6d60989.graphml b/graph/incidents_graphml/4/481986c0-676e-11ee-acda-6b17f6d60989.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5b07ad1cba6acb7ec79ab45137b18d316d30759
--- /dev/null
+++ b/graph/incidents_graphml/4/481986c0-676e-11ee-acda-6b17f6d60989.graphml
@@ -0,0 +1,951 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.151
+ 100.64.34.151
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.152
+ 100.64.34.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.153
+ 100.64.34.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.78
+ 100.64.8.78
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.154
+ 100.64.34.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.30
+ 100.64.20.30
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.171
+ 100.64.14.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.155
+ 100.64.34.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.156
+ 100.64.34.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.157
+ 100.64.34.157
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.125
+ 100.64.12.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.204
+ 100.64.2.204
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.60
+ 100.64.12.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.158
+ 100.64.34.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.159
+ 100.64.34.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.160
+ 100.64.34.160
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+ INCIDENT_LINK
+ 1696943384
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 481986c0-676e-11ee-acda-6b17f6d60989
+
+
+
diff --git a/graph/incidents_graphml/4/4819a080-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/4/4819a080-fb83-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d3621f9c49ab755dccab690200a157989b0e227
--- /dev/null
+++ b/graph/incidents_graphml/4/4819a080-fb83-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.20
+ 100.64.41.20
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685077678
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4819a080-fb83-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/4/48207f80-0a43-11ee-bdb0-15a1612d17d2.graphml b/graph/incidents_graphml/4/48207f80-0a43-11ee-bdb0-15a1612d17d2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a150e23b42c06432288f29cc87190e3cd6fb4b31
--- /dev/null
+++ b/graph/incidents_graphml/4/48207f80-0a43-11ee-bdb0-15a1612d17d2.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.82
+ 100.64.30.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.110
+ 100.64.26.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.51
+ 100.64.18.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.249
+ 100.64.10.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.83
+ 100.64.30.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.84
+ 100.64.30.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.85
+ 100.64.30.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.135
+ 100.64.23.135
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.86
+ 100.64.30.86
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.87
+ 100.64.30.87
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.34
+ 100.64.18.34
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.88
+ 100.64.30.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.89
+ 100.64.30.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.90
+ 100.64.30.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.91
+ 100.64.30.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.92
+ 100.64.30.92
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+ INCIDENT_LINK
+ 1686699458
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48207f80-0a43-11ee-bdb0-15a1612d17d2
+
+
+
diff --git a/graph/incidents_graphml/4/482b2f70-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/482b2f70-0836-11ee-b8d0-013dce35746a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5c2c7008573d0b5a765ed396297fce9a1a0ccdb
--- /dev/null
+++ b/graph/incidents_graphml/4/482b2f70-0836-11ee-b8d0-013dce35746a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.195
+ 100.64.58.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473972
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 482b2f70-0836-11ee-b8d0-013dce35746a
+
+
+
diff --git a/graph/incidents_graphml/4/482d8740-7437-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/4/482d8740-7437-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a959b705877b2b63f056cbe27ead3771279ae7b0
--- /dev/null
+++ b/graph/incidents_graphml/4/482d8740-7437-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.144
+ 100.64.71.144
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.53
+ 100.64.1.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.145
+ 100.64.71.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1670201630
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 482d8740-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201630
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 482d8740-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201630
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 482d8740-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201630
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 482d8740-7437-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/4/484a9e50-0836-11ee-b8d0-013dce35746a.graphml b/graph/incidents_graphml/4/484a9e50-0836-11ee-b8d0-013dce35746a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0790856bedd0ef5590acbf395dc9d6ed87539303
--- /dev/null
+++ b/graph/incidents_graphml/4/484a9e50-0836-11ee-b8d0-013dce35746a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.195
+ 100.64.58.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686473973
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 484a9e50-0836-11ee-b8d0-013dce35746a
+
+
+
diff --git a/graph/incidents_graphml/4/4852d050-2f75-11ee-b11e-87149c94e410.graphml b/graph/incidents_graphml/4/4852d050-2f75-11ee-b11e-87149c94e410.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5d3df4f596133ca0c834ae4cd491f80f2e9b4f2
--- /dev/null
+++ b/graph/incidents_graphml/4/4852d050-2f75-11ee-b11e-87149c94e410.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.21
+ 100.64.33.21
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.32
+ 100.64.42.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.47
+ 100.64.17.47
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.33
+ 100.64.42.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.34
+ 100.64.42.34
+ ["Exploiting Host"]
+ 0.7525
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.35
+ 100.64.42.35
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.36
+ 100.64.42.36
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.239
+ 100.64.37.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+ INCIDENT_LINK
+ 1690789126
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 4852d050-2f75-11ee-b11e-87149c94e410
+
+
+
diff --git a/graph/incidents_graphml/4/486066c0-b6d5-11ed-b037-89e5a8e9b2b8.graphml b/graph/incidents_graphml/4/486066c0-b6d5-11ed-b037-89e5a8e9b2b8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80288c7c3db8df155068c608129907875a2ef5e5
--- /dev/null
+++ b/graph/incidents_graphml/4/486066c0-b6d5-11ed-b037-89e5a8e9b2b8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.180
+ 100.64.94.180
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1677526267
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 486066c0-b6d5-11ed-b037-89e5a8e9b2b8
+
+
+
diff --git a/graph/incidents_graphml/4/4863d050-04d9-11ef-9f37-4184b1db151c.graphml b/graph/incidents_graphml/4/4863d050-04d9-11ef-9f37-4184b1db151c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..668ea48092ca7f054a6d3f7b8a77e9b539c4a2c3
--- /dev/null
+++ b/graph/incidents_graphml/4/4863d050-04d9-11ef-9f37-4184b1db151c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.195
+ USER-0015-1324.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714251674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4863d050-04d9-11ef-9f37-4184b1db151c
+
+
+
diff --git a/graph/incidents_graphml/4/4877c280-13f8-11ef-b4e0-63669a8fd788.graphml b/graph/incidents_graphml/4/4877c280-13f8-11ef-b4e0-63669a8fd788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..585dd9e86520657d3a436b54c6bf205834a03717
--- /dev/null
+++ b/graph/incidents_graphml/4/4877c280-13f8-11ef-b4e0-63669a8fd788.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.167
+ 100.64.31.167
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715914256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 4877c280-13f8-11ef-b4e0-63669a8fd788
+
+
+
diff --git a/graph/incidents_graphml/4/487adac0-04d9-11ef-9f37-4184b1db151c.graphml b/graph/incidents_graphml/4/487adac0-04d9-11ef-9f37-4184b1db151c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb6da768632bb2657c2d2cb77b93ac2de1537dc7
--- /dev/null
+++ b/graph/incidents_graphml/4/487adac0-04d9-11ef-9f37-4184b1db151c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.195
+ USER-0015-1324.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714251674
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 487adac0-04d9-11ef-9f37-4184b1db151c
+
+
+
diff --git a/graph/incidents_graphml/4/487fb8d0-dfa2-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/4/487fb8d0-dfa2-11ee-9120-ff7b7094ac3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..806ef469d425f2b7e1c4eb7f0596fb250694c32f
--- /dev/null
+++ b/graph/incidents_graphml/4/487fb8d0-dfa2-11ee-9120-ff7b7094ac3d.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.200
+ 100.64.27.200
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.70.192
+ 100.64.70.192
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710159858
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 487fb8d0-dfa2-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159858
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 487fb8d0-dfa2-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159858
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 487fb8d0-dfa2-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159858
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 487fb8d0-dfa2-11ee-9120-ff7b7094ac3d
+
+
+
diff --git a/graph/incidents_graphml/4/48971cd0-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/4/48971cd0-e873-11ee-9a77-df185ba75d8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ffa3c7b331c0632bc39a61beba3edee2e1e4817f
--- /dev/null
+++ b/graph/incidents_graphml/4/48971cd0-e873-11ee-9a77-df185ba75d8e.graphml
@@ -0,0 +1,753 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.194
+ 100.64.70.194
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.49.89
+ 100.64.49.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.70.193
+ 100.64.70.193
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.11.178
+ 100.64.11.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.16
+ 100.64.9.16
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.28.98
+ 100.64.28.98
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.195
+ 100.64.70.195
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.38.150
+ 100.64.38.150
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.70.196
+ 100.64.70.196
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.70.197
+ 100.64.70.197
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.8.120
+ 100.64.8.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.8.174
+ 100.64.8.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.31.242
+ 100.64.31.242
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48971cd0-e873-11ee-9a77-df185ba75d8e
+
+
+
diff --git a/graph/incidents_graphml/4/4897b910-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/4/4897b910-e873-11ee-9a77-df185ba75d8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc54198f324a88c6b31ca9a192dfe8f56e1a0a8a
--- /dev/null
+++ b/graph/incidents_graphml/4/4897b910-e873-11ee-9a77-df185ba75d8e.graphml
@@ -0,0 +1,249 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.198
+ 100.64.70.198
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.20
+ 100.64.68.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.81015625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.199
+ 100.64.70.199
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.78
+ USER-0015-1522.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.200
+ 100.64.70.200
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4897b910-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4897b910-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4897b910-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4897b910-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4897b910-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4897b910-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4897b910-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4897b910-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4897b910-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4897b910-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4897b910-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 4897b910-e873-11ee-9a77-df185ba75d8e
+
+
+
diff --git a/graph/incidents_graphml/4/48985550-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/4/48985550-e873-11ee-9a77-df185ba75d8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66de1c22d2869f78c40817331e2cc3ba3dc41ea4
--- /dev/null
+++ b/graph/incidents_graphml/4/48985550-e873-11ee-9a77-df185ba75d8e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.201
+ 100.64.70.201
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Protect","CASB","Azure Security","Windows Active Directory"]
+
+
+ HOST
+ 100.64.70.202
+ 100.64.70.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48985550-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48985550-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48985550-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129233
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 48985550-e873-11ee-9a77-df185ba75d8e
+
+
+
diff --git a/graph/incidents_graphml/4/48b4a500-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/4/48b4a500-140e-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc54572eff39259c82f247a619dc7d718673593d
--- /dev/null
+++ b/graph/incidents_graphml/4/48b4a500-140e-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.211
+ 100.64.8.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.88
+ 100.64.72.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.38.17
+ USER-0015-1933.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687776207
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 48b4a500-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776207
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 48b4a500-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776207
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 48b4a500-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776207
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 48b4a500-140e-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/4/48ca9430-62c1-11ee-b24d-ffed8a6ae3b7.graphml b/graph/incidents_graphml/4/48ca9430-62c1-11ee-b24d-ffed8a6ae3b7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8991ba060dec31981f7f3f5f9a02f3b5ba9c8e8
--- /dev/null
+++ b/graph/incidents_graphml/4/48ca9430-62c1-11ee-b24d-ffed8a6ae3b7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.212
+ 100.64.9.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696429278
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 48ca9430-62c1-11ee-b24d-ffed8a6ae3b7
+
+
+
diff --git a/graph/incidents_graphml/4/48cdf960-140e-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/4/48cdf960-140e-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..803771737d9ace82df277acdf20fe57c60e4b04c
--- /dev/null
+++ b/graph/incidents_graphml/4/48cdf960-140e-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.229
+ 100.64.57.229
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.227
+ 100.64.82.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687776208
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 48cdf960-140e-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687776208
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 48cdf960-140e-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/4/48dcde60-2270-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/4/48dcde60-2270-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dccd47dfc4eea6f9e7bac44253b885002c216cea
--- /dev/null
+++ b/graph/incidents_graphml/4/48dcde60-2270-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.134
+ 100.64.91.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1967.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1689357615
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 48dcde60-2270-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/4/48eacac0-850d-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/4/48eacac0-850d-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..431c0642eda0a897734cdd6aa36f228548ad135e
--- /dev/null
+++ b/graph/incidents_graphml/4/48eacac0-850d-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.50
+ 100.64.9.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700200260
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 48eacac0-850d-11ee-89b4-37c02fa13bd9
+
+
+